How you invade your own privacy

There's a select few of my friends who are really serious about their privacy. They all use strong passwords for everything, many don't bother with online banking or use bill pay services, most don't use eBay or Amazon, and most don't have social media accounts or, if they do, they are very careful about what they post and very cautious about who they friend. They never use their home address online, they're cautious about giving out their phone number, and so on.

In other words, despite being tech-savvy and computer literate, they are consciously trying to stay out of the world that many of them are creating.

[EFF:Trust Twitter to protect your privacy]

And this kind of rather extreme self-protection is understandable: They, better than most, know how easily privacy is lost and how, once lost, it can't be regained. That said, in the 21st Century, is trying to stay off the radar really possible?

The answer is no, unless -- and this is a big hurdle to clear -- you are willing to give up the thousands of conveniences and opportunities that the digital world seduces us with. If you wanted to be not so much off the grid as off the matrix but still be in the U.S., you'd have to be willing to live in a cabin way out in the woods somewhere, have no utilities, spend only cash, grow most of your own food, never, ever, ever get sick and, if you were really serious, break the law by not filing your taxes and being generally unaccountable as a citizen.

If that appeals to you then the best of luck to you because it would be, in modern America, very, very difficult to pull it off, and, the way things are going, within a few years it will become truly impossible.

Why? Because as the recent NSA intelligence gathering revelations demonstrated, if there's some data out there that might have any bearing whatsoever on national security, homeland security, law enforcement, or taxation, then there's some raving bureaucrat somewhere who wants to pigeonhole said data just in case. Once those little nuggets of data have been collected, collated and corralled you are in the matrix, er, system forever.

What these friends of mine are doing is perversely contrarian to the direction our global culture is taking. A majority of people worldwide no longer really seem to care about privacy (of course, "no longer" rather assumes they really understood or cared about privacy in the first place). How do I know that we collectively no longer care?

In May this year business consulting firm Infosys conducted a survey of 5,000 digitally savvy consumers (1,000 each in the United States, United Kingdom, France, Germany and Australia) aged 18 to 69 to establish their criteria for sharing their personal data and what they thought about ways their data might be used.

While it is generally accepted that Europeans are much more concerned about privacy than North Americans, the survey showed that the gap is arguably smaller than supposed. For example, when making an online purchase 57% German users are willing to share data while 75% of the French, and 79% of the Brits are OK with it. At 74% the Aussies are closer to the French but the winners and still champions at giving away the goods are ... you guessed it, the Americans (at 88%).

Surprisingly, consumers seem to trust their banks: 56% of Germans, 62% of the French, 75% of Australians, and 78% of Brits said they were OK with sharing their personal data with their bank. Again, the Yanks win out with 83% willing to divulge their private details to their banks despite having been well and truly screwed by Wall Street.

The attitude toward banks is particularly surprising given 82% of all those surveyed saying they expect their bank to mine or review their purchases to detect anomalies from identity theft. This is interesting because to do this kind of analysis requires significant insight into patterns of purchasing -- the who, what, when and, most importantly, why of people's spending habits. So, how will those consumers feel when their wives show them an automated letter or email warning them of an unusual jewelry purchase that said wife, who isn't near a birthday or other occasion that warrants said bling, hasn't received?

Think that kind of event is unlikely? Then let me remind you of the little PR disaster that Target created for themselves when they mined customer data with the goal of identifying and then marketing to women who had recently become pregnant. They found purchasing patterns that identified these consumers very effectively, but the exercise wound up ratting out a 16-year old girl who was keeping her pregnancy secret from her family.

This is what's called the mosaic problem. All those scattered bits of data have little meaning or significance in and of themselves, but put together, they paint a detailed picture that is far more revealing than expected or, if it's your data, wanted.

And consumers don't really know what they think about their data being mined to provide a more customized experience: While the survey showed 39% considered it to be an invasive practice, the terms helpful, convenient, time-saving and good service scored 35%, 33%, 32%, and 27% respectively, proving that these are sheep that want to get shorn.

What this survey shows us is what I think we know about ourselves -- we're blabber-mouths who want to be treated like kings and queens. We just love getting what we want with as little effort as possible, we want it now and we want it cheap.

Sure, it's two bucks more than down the road, but we've got free same-day shipping and we don't have to get out of our pleather-covered Barcalounger and waste good tee-vee watching time to get what we want, so whatcha want to know?

Gibbs is keeping schtum in Ventura, Calif. Open up to him at and follow him on Twitter and (@quistuipater) and on Facebook (quistuipater).

Read more about wide area network in Network World's Wide Area Network section.

Join the CSO newsletter!

Error: Please check your email address.

Tags securityebaytwitterWide Area Network

More about Amazon Web ServiceseBayEFFFacebookInfosysNSAWall Street

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Mark Gibbs

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place