Looking for Orwell, missing Huxley, or Why privacy law is failing: Notes from a lecture

Being invited to talk somewhere else is always thrilling. Being asked to go to Berlin was even more so. The event was part of Internet und Gesellschaft Co:llaboratory who have been working on Internet & Human Rights. The event was a full day of talk (admittedly a lot in German but I had wifi and work to do so I was happy) followed by an open seminar with three talkers. These notes are from the presentation I gave at the seminar.

The lecture opened with a look at three historical highpoints of privacy regulation and thought. First was 1890 which was the year where Warren & Brandeis published their seminal paper The Right to Privacy which attempts to create a new right in society. Today, living in a rights-focused society arguing for rights seems natural (or banal) but what was it like to be the first to argue the right to privacy?

To exemplify the situation I showed the killer app of the 1890s. It was the Hollerith Tabulating Machine

Hollerith Tabulating Machine

The legal protection of privacy did not immediately spring to life and the next great step came in the 1970s where first the Lander of Hesse in Germany and the in 1973 Sweden created data protection legislation. The idea was to protect against the abuses of data collection but the state and large corporations.

The killer app of the 1970s is the impressive UNIVAC computer

UNIVAC image from Musée de l’Informatique

Kind of looks like the communal laundry room in my apartment building.

The next step was the European Data Protection Directive which attempted to harmonize data protection across Europe. It came in 1995 which as a killer app had the Windows95 operating system (couldn’t resist it!) and more importantly the first browser wars between Netscape and Internet Explorer (Microsoft released versions 1 and 2 in 1995). The browser wars are incredibly interesting as they show the importance of controlling the flow of information to the end user was not dependent on the hardware or operating system. It also shows that power consists of inserting oneself between the information and the end user – but I digress.

Before continuing I wanted to remind the audience that the law (and lawmaker) is behind the times so I quoted the late great Douglas Adams from his book The Salmon of Doubt

“Anything that is in the world when you’re born is normal and ordinary and is just a natural part of the way the world works. Anything that’s invented between when you’re fifteen and thirty-five is new and exciting and revolutionary and you can probably get a career in it. Anything invented after you’re thirty-five is against the natural order of things.”

Following this I added a theoretical dimension to the lecture. The regulatory pyramid is intended to show that we focus on the law – this is what I was taught at law school. But the law is a self-sustaining system that ignores (or struggles to) the realities of social norms/rules and architecture. Social norms, not law, are what control most of our behavior the law is often too expensive, too drastic, too formal to be an efficient mode of conflict resolution. When someone “steals” “your” parking space, you don’t sue or call the prosecutor. You apply social norms. Your reaction depends on your upbringing and context – you may smile sweetly, flip them off or become verbally or even physically violent. Architecture is how the world works. It controls us by the rigidity of its being.

Regulatory Pyramid

If you want to slow down cars from speeding the law could be applied (a traffic sign will remind us of a pre-existing rule), or we use social norms by reminding drivers of accidents or children playing in the area. By implementing architecture we remake the physical environment and, for example, add bumps in the road – at this all cars must slow down. It is, however, important not to confuse the equal treatment with fairness. Architecture will prevent even an ambulance that may have good reasons to drive faster in a slow area.

As an example of my theory I show this wonderful/awful park bench in Tokyo.

image from Yumiko Hayakawa essay Public Benches Turn ‘Anti-Homeless’ (also recommend Design with Intent)

The bench is an example of outdoor public furniture known as anti-homeless technology or anti-bum benches. In order to prevent an undesirable group of people from using a public space we could create a rule against it – but by creating a law we need to accept the democratic constraints in rule making. Someone could remind us that in a democracy excluding people is inherently wrong. By choosing a bench that is unsuitable for sleeping the democratic process is bypassed. Additionally the park officials can always claim to have made an aesthetic choice i.e. we like this bench, rather than being against homeless people. This is control through design choice – imagine the control that may be created in manipulating communications technology.

The next segment is surveillance theory. As individuals we constantly leak and spread information. Most of us attempt to create strategies of control for our information flows. The most common is the process of compartmentalization which means that we present different information to different groups. I.e. the information you give about what you did over the weekend may be different when presented to your boss, wife, mother, children, best friend or lover. This is not necessarily lying but it is an attempt of controlling flows of information. Technology, and in particular social media, is all about losing the ability to practice this control.

Traditional surveillance theory is based upon Michel Foucault’s developments of Jeremy Bentham’s plans for the Panopticon prison. The concept is basic – if we are unaware of being watched we will internalize our own surveillance and become our own jailers. This is the whole premise of George Orwell’s book nineteen eighty-four: Big Brother is watching you. People under constant surveillance can be controlled. But is this really true? The control by the state is under constant refinement and yet citizens still attempt to cheat and steal – violent crime in general remains constant despite cctv. Could it be that Foucault (and Orwell) got it wrong?

The next step is technology. For me it’s the radical Huxleyian shift. What Orwell feared was totalitarian control via surveillance technology. But Huxley premised a more base society. Give people enough sex and drugs and they won’t care who controls them. Enter the convenient, comfortable, entertaining world of social media.

Social Media Timeline

Our newfound joy of communications technology has already changed our behavior in a major new way. Patterns of behavior that were deemed amoral, antisocial or even illegal have now become acceptable. Spending an evening looking at pictures of your ex-partners new partner would have been a textbook case of voyeurism and stalking. Today, its just Facebook. This reminds me of this early cartoon:

Additional changes in our behavior which should concern us are the fact that we can no longer refuse, ignore or exclude social media from our lives. Many claim they don’t have time for such nonsense but this will not be an efficient information control strategy. Even individuals outside social media use are being photographed and tagged by users and therefore identities are being created of them. These “friends” will also ensure that opting out is not a viable option.

The final level of surveillance is autoveillance. This is the self-chosen role of spreading information about ourselves. This is not the fact that my telephone stores and communicates my location information and more. This is part of the performance lifestyle which has created a performance anxiety, a need to present interesting inspiring activities from an ordinary lifestyle.

This may be silly, but is it harmful? Here it is not enough to study the moves of individuals (even millions of individuals).

Basically we are being seduced by technology, locked by licenses & killed by a lack of social responsibility. This creates four harmful outcomes that need somehow to be countered: Privacy, Personalization, Information obesity, & mind control.

As with the Japanese park bench above, understanding the users will not enable us to see the intentions of the manipulators. We must look to those with influence in social media and who can be more influential than Mark Zuckerberg.

Zuckerberg has been quoted as saying privacy is no longer a social norm

Which is interesting given the fact that he has created a system which helps us to forget our inhibitions about sharing personal information and that his business model is premised on our sharing. He has a stake in the removal of protections against privacy.

Zuckerberg on the topic of personalization of technology: “A squirrel dying in your front yard may be more relevant to your interests right now than people dying in Africa” (Pariser NYT)

Sure there have always been gatekeepers choosing which information is important for me or not. But these gatekeepers did not create a personal information resource only for me. The daily newspaper is created to appease a society of readers. I may chose to ignore an article but at least it’s there in front of me. In a personalized world I will no longer be confronted by any kind of information that does not fit my profile.

The Holy Grail of many Internet providers is to give us this kind of personalization. The problem occurs when this kind of convenience and service removes our ability to control our flows of information. We lose the ability to read information that we may need – because we are constantly being bombarded by the information Facebook thinks we want.

Information obesity: Our bodies crave sweet and fatty foods. One way of looking at this is through the lens of evolution. Finding fatty and sweet foods was key to our survival but these were not to be found everywhere or everyday. Today we are surrounded by fatty and sweet foods so access is not the problem. The problem is overindulgence and obesity due to accessibility. This forces us to think about diet, to think about exercise. Self-control is essential to our survival.

The same is true of information. The sweet and fatty information in a long historical context was an understanding of who was allied with whom? Who is sleeping with whom? And whom can I get my genes over to the next generation (obviously just a nicer way of thinking about getting laid!). This is why we today have a fascination about gossip. Which minor celebs are attempting to sleep with each other takes up an extraordinary part of our lives. But this was all ok since the access to gossip was limited. Today, however, we are connected to the largest gossip engine ever conceived. Facebook may try to hide it in its spin, but part of our fascination is all about looking at each other. The problem is that there is only a limited amount of time in life and spending too much time on gossip limits our ability for more relevant information. We are becoming information obese and the solution is to decrease fatty information intake and go to the information gym regularly.

The final concern is of mind control. This is all about what happens when a social media is told that you are interested in a certain thing. Say, for example, you have a secret pleasure in seeing videos of kittens being kicked. You would never say this aloud – and if you did your social group would correct you by telling you this is an unhealthy impulse. You may even manage to convince yourself that you have no sadistic urges in this area. However, social media knows the truth and will continue to give priority to information about kitten kicking. You may resist some of it but if you have an urge you probably will click on some of the information. By clicking you re-enforce the information algorithm and you will be sent even more kitten kicking information. A question of moral responsibility can now be posed: While your latent sadistic tendencies are being reinforced and enhanced – what is the moral responsibility of the provider? This is akin to asking whether a drug pusher has any moral responsibility to his clients. In your answer consider that many users of social media are very young and there is no general awareness or discussion on the harms of social media.

So what about regulation? Well the problem is that we are considered to be autonomous. In other words we are old and wise enough to live our own lives. Indeed we have all agreed to the terms of use of social media sites. We may not have read them, maybe not understood them, they may have changed drastically since we read them – but legal fiction is that we agree to them.

This shouldn’t be a problem. If society deems an activity harmful enough it can, and should, legislate against it – even if some may protest this regulation. There have been protests against: motorcycle helmets, seatbelts, hitting children and the right to smoke (makes you lose faith in human intelligence) but the social cost was deemed greater than the loss of individual autonomy. The problem with social media is that the social costs are not particularly visible.

Finally on the question of gatekeepers and Orwellian or Huxleyian control it is interesting to note that typical Orwellian control is easier to see and therefore easier to protest against. Therefore the cost of maintaining it against the wishes of the people is too high to bear in the long run. But Huxleyian control is based on making me happy, fulfilling my desires. Counteracting this requires that I first become aware and then exercise self control. This is difficult on an individual level and close to impossible on a social level.

Here are the slides which accompanied the lecture.

Because we can: comments from a lecture

The weekend and FSCONS is now over. This year my presentation was the last talk of the final session. It’s a dirty job but someone’s got to do it?

My presentation was on the topic of privacy and raised the question of whether it is possible to maintain ones privacy in the world of extreme technology dependencies and broad social technology adoption. The answer is, dependably & depressingly, negative.

The talk was entitled Off the Grid: is anonymity possible? And focused on different forms of surveillance that are in the hands of uncommon players today. This is not big brother society, this is not little brother society. What we have is a society were privacy is lost because our contacts inform their contacts of interesting details from our lives. These details are able to be spread further by my contacts contacts. Potentially reaching the ends of the Internet. Whether or not this happens does not depend on anything I control but the interestingness of the information.

To illustrate this I displayed this tweet:

Translation: Thing that can happen at #fscons: @Klang67 proclaims himself queen. A bit unclear over what.

This is a form of surveillance through acquaintances and therefore I have chosen to follow the French wording (surveillance is French for viewing from above) and called this connaivellance for the fascinating word connaissance or acquaintance. I find the French word more interesting than the English as its root connai is the word for knowledge. Therefore, the French connaissance (acquaintance) is someone who has knowledge of you. How very apt.

The next form of surveillance is the self-surveillance of the social media age where we tell the world of ourselves. Or as a professor I met earlier in the week protested, with absolute conviction: “Twitter? That’s only people telling each other what they had for breakfast!”

Another thing I find fascinating with social media is the way it shapes our communication. One part of this is the way in we move towards the extremes. Few people online drink coffee, read books, or listen to lectures… We all seem to read fantastic/terrible books, drink great or awful coffee and lectures are either inspiring or snooze fests. All this with a shower of smileys too.

Both this autoveillance (which I have written more about here) and this connaivellance filled much of my lecture. As the law fails to protect, and our acquaintances and ourselves enthusiastically push information the last lines of defense must be the attitudes and interests of the social media creators. What my lecture showed was that protecting us is not in their interest. Therefore we stand unprotected. The slides from my presentation:

This morning I came across a further example of surveillance which needs to be added to the list. The story comes from a Forbes article by Dave Pell, entitled Privacy Ends at Burger King. The short version of the story is that a man who heard a married couple argue at Burger King began live tweeting the event and added pictures and even video clips. He began his broadcasting with the tweet “I am listening to a marriage disintegrate at a table next to me in this restaurant. Aaron Sorkin couldn’t write this any better.”

Pell’s analysis:

In that Burger King, Andy Boyle thought he was listening to the disintegration of a couple’s marriage. He was really hearing the crumbling of his own ethics and self-restraint. We can’t stand by and let an alliance between technology and poor judgement disintegrate all decency, and turn every human exchange into another tawdry and destructive episode on a never-ending social media highlight reel.

This example provided an interesting additional example to my discussion on surveillance. For me, this example shows an additional reason why any attempts to control social media (legally, socially or technically) will fail. The desire of people to communicate the interestingness in their (and others) lives makes control a difficult affair.

FSCONS continued late into the night.

Surveillance, Sousveillance & Autoveillance: Notes from a lecture

The theme for today’s lecture was about online privacy and was entitled Surveillance, Sousveillance & Autoveillance.

The lecture had to open up with a minor discussion on the concept of privacy and the problem of finding a definition that many can agree upon. Privacy is a strange mix of natural human need and social construct. The former is not easily identifiable and the latter varies between different cultures.

It is not enough to state that privacy may have a natural component – sure, put too many rats in a cage and they start to kill each other – you also need the technology to enable our affinity for privacy to develop.

For example in At Home: A Short History of Private Life, Bill Bryson writes that the hallway was absolutely essential for private life. Without the hallway people could not pass by other rooms to get to the room you need to go to – but they would have to pass through the other rooms. Our ideas of privacy were able to develop after the “invention” of the hallway.

In order to settle on a definition I picked one off Wikipedia …(from Latin: privatus “separated from the rest, deprived of something, esp. office, participation in the government”, from privo “to deprive”) is the ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively.

And to fix the academic discussion I quoted from Warren and Brandeis The Right to Privacy, 4 Harvard Law Review 193 (1890)

The intensity and complexity of life, attendant upon advancing civilization, have rendered necessary some retreat from the world…solitude and privacy have become more essential to the individual; but modern enterprise and invention have, through invasions upon his privacy, subjected him to mental pain and distress…

I like this quote because it also points to the effects of modern inventions on the loss of privacy.

In closing the lecture introduction I pointed out that privacy intervention consists of both data collection and data analysis – even though most of the history of privacy focused on the data collection side of the equation. In addition to this I broke down the data collection issue by pointing out that integrity consists of both information privacy (the stuff that resides in archives) and spatial privacy (for example surveillance cameras & the “right” to be groped at airports).

For the next section the lecture did a quick review of the role of technology in the privacy discussion. Without technology the ability to conduct surveillance is extremely limited. The early origins of tax records and collections like the Domesday book were fundamental for controlling society. However, real surveillance did not really begin until the development of technology such as the wonderful Kodak nr 1 in 1888. The advantages of this technology was that it provided a cheap, easy to use, portable ability to take photographs. Photographs could be snapped without the object standing still. A whole new set of problems was instantly born. One such problem was kodakers (amateur photographers, see “’Kodakers Lying in Wait’: Amateur Photography and the Right to Privacy in New York, 1885-1915”, American Quarterly, Vol 43, No 1 March 1991) who were able to suddenly able to take photographs at of unsuspecting victims.

Surveillance: A gaze from above

The tradition concerns of surveillance deal with the abuse of state (or corporate) power. The state legitimizes its own ability to collect information about its citizens. The theoretical concerns with surveillance are the abuse from the Big Brother state and foremost in this area is the work of Foucault and his development of the Panopticon (all-seeing eye prison). Foucault meant that in a surveillance society the surveilled, not knowing if anyone was looking, would internalize his own control.

Sousveillance: A gaze from below

The concept of sousveillance was originally developed within computer science and “…refers to the recording of an activity by a participant in the activity typically by way of small wearable or portable personal technologies…” Wikipedia

But in the context of privacy the idea was that our friends and peers (especially tricky concepts in Social Media) will be the ones who collect and spread information about us online.

We are dependent upon our social circle, as Granovetter states: “Weak ties provide people with access to information and resources beyond those available in their own social circle; but strong ties have greater motivation to be of assistance and are typically more easily available.” (Granovetter, M.S. (1983). “The Strength of the Weak Tie: Revisited”, Sociological Theory, Vol. 1, 201-33., pp 209).

This ability of others to “out” us in social media will become more interesting with the development of facial recognition applications. These have already begun to challenge social and legal norms (Facebook facial recognition software violates privacy laws, says Germany – The Guardian 3 August 2011).

Autoveillance: a gaze from within

The final level is Autoveillance – this is obviously not the fact that we are looking at ourselves but attempts to address the problems of our newfound joy in spreading personal information about ourselves.

Is this a form of exhibitionism that enables us to happily spread personal, and sometimes intimate, information about ourselves? Is this the modern version of narcissism?

Narcissism is a term with a wide range of meanings, depending on whether it is used to describe a central concept of psychoanalytic theory, a mental illness, a social or cultural problem, or simply a personality trait. Except in the sense of primary narcissism or healthy self-love, “narcissism” usually is used to describe some kind of problem in a person or group’s relationships with self and others. (Wikipedia)

We have always “leaked” information but most of the time we have applied different strategies of control. One such strategy is compartmentalization – which is the attempt to deliver different information to different groups. For example my mother, my wife, my co-workers, my friends and my children do not need to know the same stuff about me. But social media technology defies the strategy of compartmentalization.

At the same time as this is happening our social and legal norms have remained firm in the analog age and focus on the gaze from without.

Then the lecture moved from data collection to data analysis. Today this is enabled by the fact that all users have sold away their rights via their End-User License Agreements (EULA). The EULA is based upon the illusion of contracts as agreements between equals. However, as most people do not read the license, or if they read the license they don’t understand it, or if they understand it the license is apt to change without notice.

Today we have a mix of sur, sous & autoveillance. And again: regulation mainly focuses on surveillance. This is leading to an idea about the end of privacy. Maybe privacy is a thing of the past? Privacy has not always been important and it may once again fall into disrepute.

With the end of privacy – everyone may know everything about everyone else. We may have arrived at a type of Hive Mind. The hive mind is a concept from science fiction (for example Werewolves in Twilight, The Borg in Star Trek and the agents in The Matrix). An interesting addition to this line of thinking is the recent work by the Swedish philosopher Torbjörn Tännsjö who argues that it is information inequality that is the problem.

The problem with Tännsjö’s arguments is that he is a safe person living in a tolerant society. He seems to really believe the adage: If you have done nothing wrong, you have nothing to fear. I seriously doubt that the stalked, cyberbullied, the disenfranchised etc will be happier with information equality – I think that they would prefer the ability to hide their weaknesses and to chose when and where this information will be disclosed.

The problem is that while we had a (theoretical) form of control over Big Brother we have no such control over corporations to whom we are less than customers:

If you are not paying for it, you’re not the customer; you’re the product being sold.

The lecture closed with reminders from Eli Pariser’s The Filter Bubble that with the personalization of information we will lose our identities and end up with a diet of informational junk food (the stuff we maybe want but should not eat to much of).

Then a final word of warning from Evgeny Morozov (The Net Delusion) to remind the audience that there is nothing inherently democratic about technology – our freedom and democracy will not be created, supported or spread just because we have iPods…

ShareMeNot

Via Bruce Schneier come news of an important plugin

ShareMeNot is a Firefox add-on for preventing tracking from third-party buttons (like the Facebook “Like” button or the Google “+1” button) until the user actually chooses to interact with them. That is, ShareMeNot doesn’t disable/remove these buttons completely. Rather, it allows them to render on the page, but prevents the cookies from being sent until the user actually clicks on them, at which point ShareMeNot releases the cookies and the user gets the desired behavior (i.e., they can Like or +1 the page).

The add-on is also important as it highlights the fact that information is being shared even when the button is not clicked.

Nordic Countries ask Facebook about privacy law

Norway has a longish tradition of questioning whether Facebook is in compliance with national integrity legislation. Way back in December 2009 I wrote (in Swedish) about the Norwegian Consumer Agencies early attempts to analyze Facebook’s relationship to privacy legislation. I was subsequently quoted on a t-shirt by the consumer agency!

Now the Data Protection Agencies of the Nordic countries have put together a list of questions to Facebook. The questions deal with the way in which the company complies with integrity legislation. The questions were sent from the Norwegian Data Protection Agency (Datatilsynet) but the questions are a collaboration from the agencies of Norway, Sweden, Denmark, Faroe Islands, Finland and Åland. Read the questions sent to Facebook.

There is also an interesting background report from the Datatilsynet: Social Network Services and Privacy: A case study of Facebook by Atle Årnes, Jørgen Skorstad and Lars-Henrik Paarup Michelsen (15.04.2011). There is also the press release from Datatilsynet (in Norwegian).

The appearance of justice

Just today I was asked by the media about the effects of social media on the courts. The reason why I was asked for my opinion was the notorious Casey Anthony case. The basics were that Casey Anthony’s two year old child Caylee goes missing but the mother does not report this for 31 days. The rest is stranger than any drama writers creation: the mother is shown to be a incredible liar, dancing and happy, even getting a tattoo with the words “Dolce Vita”. The grandfather is accused of incest, the police boyfriend lies to the police and social media is mined for any and all evidence that can be found.

For the last three years Casey Anthony has been waiting for her trail while the world has been discussing every fact and fiction related to the case. The story begins with the media and then is picked up on various social media channels.  The professionals work on building a case and a defence. Social media even figures in the jury selection where Facebook accounts are mined to see if a presumptive jury member is good or bad.

The idea in this situation that you can find an impartial group of people in the middle of a media storm is an anachronism. There were serious questions of whether the jury would be affected by the popular opinions expounded in social and other media. The discussion reached fever pitch during the trial and when the jury left for their deliberations. And when the notification came that the jury were back #caseyanthony was trending on twitter. The verdict was unexpected by the media. Not guilty of all charges but lying to the police. The rage on twitter was incredible. The verdict was that the prosecutor was unable to prove Casey Anthony’s involvement in murder or child abuse.

Even earlier there were comparisons between the O.J. Simpson case but here was a major difference – those who were angry during the Simpson case could only scream at the TV with twitter the screams could be shared, discussed and amplified.

No matter which verdict the jury had presented the question of influence from social media hangs in the air. Even if the jury were not supposed to know anything – is it possible to be unaffected by the media storm?

The next problem is the question of what role social media should play in a court process. In Sweden we still prohibit cameras in the courts – this means that the public can twitter, blog, comment and link to external photographs – but not point a lens. The purpose of this is to protect the integrity of the court process but is this protection pointless considering the prevalence of social media? Should we therefore allow cameras or prohibit social media devices in the courtroom?

A final problem is the appearance of justice. Lord Hewart is the origin of the adage “Not only must Justice be done; it must also be seen to be done.” This poses a problem: the courts are concerned with justice but what happens when the society outside the courthouse demands a verdict that the courts are unable to deliver? What is apparent from reading twitter is that the demands for justice (or blood?) from the virtual mob have hardly been met.

Articles of Interest: Emily M. Janoski-Haehlen The Courts are all a‘Twitter’: The Implications of Social Media Use in the Courts New Media and the Courts: The current status and a look at the future A report of the New Media Committee of the Conference of Court Public Information Officers Michael Bromby The Temptation to Tweet – Jurors’ Activities Outside the Trial

Interesting articles:

Emily M. Janoski-Haehlen The Courts are all a‘Twitter’: The Implications of Social Media Use in the Courts

New Media and the Courts: The current status and a look at the future
A report of the New Media Committee of the Conference of Court Public Information Officers

Michael Bromby The Temptation to Tweet – Jurors’ Activities Outside the Trial

 

Is the age of integrity over?

Today I am doing something different – stepping out of my comfort zone (but not too far). I was invited to give a short presentation (10 minutes) to spark a debate among young people between 12-19. Most of them turned out to be around fifteen. So I know I can talk to adults but the question was whether I could be relevant to teenagers.

The question I put forward was whether the need to protect integrity was a thing of the past.

So I began by presenting the question and then started with a bit of integrity orientation. The position I presented was that previously the way in which we protected our integrity was not necessarily by keeping information secret but rather giving different pieces of information to different groups of people. I called this a strategy of compartmentalization.

What this basically means is that you present different images of yourself to different people. What you did on Saturday is a constant – but you may present different stories of Saturday to your mother, girlfriend, boss, sister, friend and a total stranger (indeed you may even attempt to tell yourself a different story).

In a world where compartmentalization strategy is implemented the greatest fear is that the different groups will share information or that a body from above has access to different versions and will be able to question the truth of your stories.

Then along comes Social Media and the constant sharing of masses of low level unimportant data about what we are doing, where we are doing it, with whom – and sometimes even why.

The problem is no longer that of different compartments knowing what you did but rather attempting to handle the fact that the compartments probably do know several versions of your truth. What we are forming here is a hive-mind. In a hive mind where everyone knows everything about you the question is no longer one of maintaining boundaries between groups. For examples of hive minds I showed them The Borg from Star Trek, The Protoss from Starcraft, The Agents from the Matrix films and The Warewolves from Twilight.

The question becomes one of handling total openness. The question becomes one of: what is the point of attempting to maintain integrity regulation? In a world were we know everything about each other the question of wanting integrity becomes suspicious. And the old idiot saying: You have nothing to fear, if you have nothing to hide becomes downright ominous.

The discussion that followed was interesting, exciting and creative. The kids touched upon the meaning of truth, the nature of evil, the importance of secrets and the meaning of life. I was very impressed.

Toilet brush covert surveillance camera

Via BoingBoing comes the story of a creepy man secretly filming women in a Starbucks restroom.

A 25-year-old man hid a video camera disguised as a plastic coat hook inside the women’s restroom of a Starbucks in Glendora, CA, and secretly recorded more than 40 women and children using the toilet over two days. The man “downloaded the device about every hour to his laptop computer while sitting in his car,” according to police. (LA Times)

Most of us would be in agreement that the actions of the man are creepy. But what I find interesting is the point that nowhere in the original story (LA Times) is the manufacturers responsibility discussed. What moral responsibility does a manufacturer/designer have for a camera, disguised as a plastic coat hook, that can be affixed to a wall?

The coat hook is – in this context – an almost a reasonable product. There is a whole range of hidden bathroom camera devices on the market. How about the toothbrush camera, toilet brush camera, shower radio camera, bathroom light camera, toothpaste camera, hair clipper camera, soap dish camera, shower mirror camera, shampoo bottle camera… (all from the same manufacturer)

There may be certain situations where invading someones privacy with the help of covert surveillance cameras is legitimate – maybe even necessary. But the mass market for goods to cover these situations is hard to envision. It is even more difficult for me to understand when it could be a legitimate need to covertly film people in the bathroom. And yet there are mass market cheap goods that cover this particular situation.

So when the creepy 25-year-old uses these products – he is being creepy. But when would the use of this stuff not be creepy?

Does the fact that these products exist and are easy to buy promote and encourage creepy behavior?

Privacy and plancenta

Judging from the number of cases where medical staff have been fired for posting images on Facebook it seems obvious that Facebook somehow manages to confuse professionals into forgetting the basic principles of privacy. Internet Cases reports on the interesting case where a student nurse was expelled for posting a picture of herself with a placenta. She has now sued the college and won.

Plaintiff nursing student and some of her classmates attended a clinical OB/GYN course at the local hospital in Olathe, Kansas last November. They got permission from their instructor to photograph themselves with a placenta. Plaintiff posted the photo on Facebook. She got expelled from school. Yes, I know you want to see the photo. Here it is. Byrnes v. Johnson County Community College, 2011 WL 166715 (D. Kan., January 19, 2011).

It is difficult to see how a picture of a placenta can be viewed as a privacy violation even if photographing body parts may be less than professional. The placenta has no rights in itself and identifying the owner of the placenta from an image of the organ seems impossible.

Fame at last!

In December 2009 I wrote a positive text in my Swedish blog about the Norska Forbrukerrådet (Norwegian Consumer Council) and their decision to write a report and demand answers from the Norwegian Data Protection Authority on the role of social networking sites in relation to personal integrity. I ended the post with the words:

Detta är ett härligt exempel på socialt patos från en nationell aktör i en globaliserad nätbaserad värld.

Translated: This is a wonderful example of social pathos from a national actor in a globalized network-based world. Today I received an email from the Norska Forbrukerrådet. Partly they wanted to inform me that there report has been sent in:

Facebook operates in a virtually lawless sphere as far as data protection and terms of use are concerned. The terms and conditions are not made available and are subject to frequent changes by the company. The Consumer Council of Norway is therefore asking the Data Inspectorate to clarify what Facebook and other social networking sites can and cannot do under the law.

The complaint against Facebook/Zynga is here (in Norwegian) and their readable report on integrity & sociala medier is here (in English).

On a more personal note the mail contained some really cool news. The Consumer Council has taken the closing words from my original post and put them on a t-shirt! This must be my best quote ever.