Big Data/Analytics Zone is brought to you in partnership with:

Jason Whaley is a Java developer specializing in service oriented architectures, enterprise integration, cloud computing, and continuous integration. Previously, Jason has worked in multiple roles for both public companies as well as government institutions in a variety of roles for several broad ranging Java based projects. Presently, Jason works at Nodeable as a platform developer where he is helping build a next generation infrastructure monitoring and analytics tool. He is also a contributor to The Basement Coders Podcast. Jason is a DZone MVB and is not an employee of DZone and has posted 17 posts at DZone. You can read more from them at their website. View Full User Profile

On Schneier's Survelliance State

03.19.2013
| 1338 views |
  • submit to reddit

I’ll say this up front before continuing. I absolutely love reading Bruce Schneier and thoroughly respect his opinion on damn near everything that has to do with electronic security and privacy. This post is basically a brain dump of thoughts and rebuttals that immediately sped through my mind as I read his latest piece over here on CNN.

Let’s start with anecdote about Google since Google seems to be the posterchild for an external entity mining data on everything about us it can find online.

Just now I typed in the search query ”set add”, a rather ambiguous query without context, in a browser that presently is logged in to my Google account. The first ten results have to do with adding an element to a set in various programming languages. The last thing to appear is in the section named “News for set add”, where the first visible entry is an article about a free agent signing in the NFL. If you know me at all, then you know that pretty much every single hit visible on the first page seems to be relatively tailored to me - I’m a software developer who loves (and played collegiate) American football. Google has profiled me that well.

Just for comparison’s sake, let’s do the same search on Bing - a search service that I’ve used probably less than 5 times in the last 2 years. The first two hits are for Java documention. After that we’ve got stuff about Drum Add-Ons Sets, Swing Sets, Setting up and Adding Email, and something called SETAD. Bing obviously does not have me profiled that well.

I can’t tell you how much time I save on a day to day basis by Google’s ability to give me what I consider to be the best search results. The fact that I very rarely have to context switch from solving “$X problem” to “how do I get this search engine to find what the hell I’m looking for” is really quite invaluable.

Such convenience and overall utility is what Bruce fails to consider in his CNN piece. Bruce concludes his article by saying “Welcome to an Internet without privacy, and we’ve ended up here with hardly a fight”. I’d like to opine that we’ve ended up here on purpose and, as evidenced above, to our benefit. We’ve ended up here without anything to fight about… yet.

The fact that Google has me profiled basically led to its service being able to tailor results for me. It’s so damn tailored to me that I haven’t even considered switching to something else even on the days where I feel like maybe I ought to be wearing a tin foil hat after all. In general, the results of my anecdote are very similar to how I perceive most people view their privacy on the internet. In summary, general opinion is “yes, I might be accessing this from my device, but this is the public square and I want everything in the public square to deliver the best personal experience to me… who cares if they know that I like Java and Football!”. Google implicitly learns about me as I trade the illusion of my privacy to them in exchange for better search results. I find this inherently good, truth be told.

Conversely, Bruce seems to be coming from a position that the “powerful are spying on the powerless” and this is inherently bad. I find that an interesting position to take when two of the first three examples Bruce gives as data points to open up his article are about crackers who definitely were not powerless and the third example involved a women who was bedding the top intelligence official of the United States of America. These don’t exactly sound like people without a certain amount of power in the world we are describing. All three of the examples resulted in the discovery of identities of people engaging in what could at least be considered ethically dubious behavior.

What about the real powerless in this context - those being consumers who are locked in to having their activity monitored and mined just to participate in modern society? In my admittedly limited experience with the world after 1998 (when I first got internet access), I’ve observed that typically the only time someone actually wishes to hide their identity online or minimize their footprint is when they are actively engaging in what could also be considered ethically dubious behavior. All of the talk of wanting to maintain privacy because of fears of overly powerful governments and/or businesses monitoring and profiling is just lip service by folks who are trying to not pay for something that is of value to them. Note that I use the phrase “could be considered ethically dubious”. Without delving into the extremely nuanced topic of whether pirating and cracking are unethical, or even remotely wrong (I refer you to “Free”, by Chris Anderson for some thoughts on pirating, at least) let’s just say that to determine what is ethical here is very interesting and depends on your perspective. Generally speaking, if you aren’t doing anything that could possibly harm someone else (emotionally, monetarily, reputation, etc. etc.) then there isn’t anything to worry about.

Or is there?

We have nothing to fight about… yet. Yes, the potential for abuse in collecting, searching, and profiling all of this data about us is extremely high. But we certainly aren’t going back now and I don’t think anyone who isn’t a complete luddite wants to either.

Sadly, I think Bruce is bit too bleak and sensationalist in the suggestion that we “now have an Internet without privacy” after making references to an Orwellian society and he’s not putting enough emphasis on what could be real abuses. The defining characteristic of an “Orwellian” society that the society be oppressive and destructive to the general welfare and openness of society. The “Big Brother” aspect is just a means to that end. Is identifying Chinese crackers who were conducting international espionage oppressive? Is the act of discovering the identities of and criminally convicting members of LulzSec destructive to our general welfare? Is finding out the identity of the woman who was under the sheets with the top appointed public official of the United States Central Intelligence Agency really a threat to the openness to society?

In all cases the answer is no. We as a society should be keeping our eyes open and be ready to raise a fight for real abuses in the use of this data and profiling. The aforementioned cases are not such abuses.

Decrying the lack of privacy in cases such as the ones Schneier has mentioned is akin to decrying all warfare between states as a completely undesirable thing, despite its total inevitably given human nature. Lack of privacy isn’t the thing to be rallied against here as that lack of privacy is completely inevitable given the nature of the internet and our interactions with each entity on it.

The United States once developed an atomic bomb in a seemingly natural progression in develping better arms, used it twice before realizing what had just been unleashed on the world, and then spent the better half of the last century trying to minimize proliferation of such weapons. We couldn’t turn back from the development of the atomic bomb just as we now can’t turn back from erosion of privacy on the internet. Unlike the atomic bomb, much good can come from the usage of this profile. The only option is to hold those in posession of that data accountable to do no harm with it.

Published at DZone with permission of Jason Whaley, author and DZone MVB. (source)

(Note: Opinions expressed in this article and its replies are the opinions of their respective authors and not those of DZone, Inc.)