Feeds:
Posts
Comments

Posts Tagged ‘covert watching’

Data once was a signature, a number on a driver’s license or even a newspaper subscription. Now it is much more but less of what you are used to accounting for. Digital information is today recorded by all manner of sensors you are not aware of and don’t see the consequences of. The new reality is data ‘Reality Mining’.

From phones, GPS units, RFID tags in office ID badges, texting, scans of your car through toll booths, credit card activity at ATMs, stores, gas stations, phone call tower identity, sensors are capturing your behavior in a digital form. Coupled with arguably suspect ‘secure’ anything digital including health information, income statements and Web surfing time, place and duration, the data organization and mining has birthed the emerging field of “collective intelligence”. Welcome.

All that digital information is going to servers and reformatted in data bases are as viral as anything you and a person with a lot of letters after their name can even imagine. And we are adolescents in this development.

A thick web refers to what our ubiquitous use of the web has brought us worldwide; data, tetra-terabytes of it daily. Collective intelligence practitioners acknowledge that their tools will create a sci-fi future on a level Big Brother on cocaine could not have dreamed of. In fact that is, the ‘thing’ about what is going on; we have no idea how we, our families, company, city, nation are going to be impacted as this approach to information finds every nook and cranny of everyone’s life. Stopping it is not an option.

Collective intelligence will make it possible, not probable, for insurance companies, employers, pharmaceutical companies to use data to covertly identify people with an identified gene, profile, affliction, etc., and deny them insurance coverage, employment or bank loans. They can also use it to snuff out an epidemic just as covertly. I wonder where the value of this will be positioned? The government through their budgeting selections can assist law enforcement agencies to identify opposition member’s behavior by tracking scanning, tracing public and private social networks (our old friend the Patriot Act has morphed while we worried about our 401K and “the wars”).

“Pernicious” means exceedingly harmful. Pernicious implies irreparable harm done through evil or insidious corrupting or undermining <the claim is that pornography has a pernicious effect on society>

Now, today, we have and are using the capability to assess a person’s behavior with reality mining of data and then interpret that profile without monitoring him or her directly, talking to him or her, or “knowing’ them. Does Kroger care if you are in a bad mood when you scan your value card? Is the East TX toll reader interested in your reasons for being there mid afternoon? Does Macy’s want you to buy only brand X and not brand Y at the same price? They all care about your behavior, not your feelings and emotions, and intentions and, and, and…

It is a mashup! People and organizations interacting with one another through multimedia digital means will never be less than it is today; it will always be more. Those interactions dynamically leave traces of that ‘behavior’. This allows scientists, the Mafia or over zealous investigative reporters, for example, and anyone with the technology access to the databases to study and learn about the behavior of those traced without the knowledge or consent of the people and groups being scanned. Techniques like that are thought to infringe on the individuals and groups being traced for commercial benefit of those that have that technology over the individuals, groups of individuals and commercial entities that don’t have that technology.

What’s more, if you or your group doesn’t want to be scanned, traced or digitally followed, you have little to say in the matter. Take the instance of “opting out” that’s put forth as a counter measure today for not being a target for spyware, spam and behavioral marketing… “Opting out” is another way some companies validate a cautious web user. For some it means that a different level of secrecy is needed for those that understand counter-control methods. If you want to be removed from lists you have the following troubles (WHICH ARE ALSO TRUE OF REALITY MINING AND COLLECTIVE INTELLIGENCE EFFORTS);

  1. You don’t know where your data is; multiple servers, entities, in the “cloud”
  2. Once in the web, your data is not a ‘thing’ it is a “byt-pat”, a partial byte sequence and a partial pattern
  3. You don’t know who owns it legally
  4. You can’t catch up to it and kill it
  5. Your intimidation by technology is being used against you
  6. You have no counter-control outside the boarders of your country
  7. Your hope is that it isn’t true of you and your data
  8. Arguments favoring scanning and autonomous tracing are wrapped in virtuous rationales

a. fighting disease: SARS, flu, etc

b. fighting terrorists: real and imagined

c. helping the sick and elderly

d. child safety: fear reduction

The reality of reality mining is that your data collected by all of these methods are like a thought you had last night when watching TV: you can’t get at it now, you can’t know exactly where it is located in your head, and once you get it back after going through some mental gymnastics it is not the same as it was when you first had it.

Every day privacy becomes more of a myth than it was even last weekend during the USC game when the water company could tell – they have the data – when the half time occurred due to a drop in the water levels in an eight minute period. We expect that the water will be there and it was. We expect that no one was watching but what “watching” means is changing. It is changing really fast and in ways no one at MIT, Bureau of the Budget and Management or the Justice Department can predict or control. The steaks for success are high. Kroger is working on it.

Are you ready for a wild ride on a roller coaster in the dark without handrails? That is what’s coming here.

Read Full Post »