ABOUT THE AUTHOR


Dave Michels
David Michels holds 20 years of telecom hands-on experience, starting with IVR systems to Fortune 100 operations. Currently President of...
Read Full Bio >>
SHARE



Dave Michels | December 07, 2011 |

 
   

It's [None of] Your Business

It's [None of] Your Business Over the next few years, privacy issues are going to drive a backlash against "free" services and perhaps even consumerization of IT.

Over the next few years, privacy issues are going to drive a backlash against "free" services and perhaps even consumerization of IT.

Last week the big news was Carrier IQ--a utility installed on a large percentage of smartphones that tracks an extraordinary amount of information and activity which is provided to the carriers without any consent or knowledge by the customer. The investigation is just getting started, but there are plenty of questions. HTC and Samsung phones have it pre-installed, but only on certain carriers. Why some carriers and why some devices is yet to unravel. From GigaOm:

"AT&T and T-Mobile USA are just the latest to admit they received data from Carrier IQ on the behavior of their customers' smartphones. However, like Sprint, they claimed it used that information solely for network optimization purposes. Verizon is the only major U.S. operator untarnished. Apple copped to installing Carrier IQ's software on all its iPhones before the release of iOS 5. HTC and Samsung acknowledged implementing Carrier IQ, but only at the behest of their carrier customers, which didn't prevent them from getting slapped with class action lawsuits."

Carrier IQ is obviously an extreme example of privacy invasion, but smartphones do hold a treasure trove of personal information--an end user agreement and a free app may be all it takes to legally access it. It is surprising the access rights all these "free" apps require.

There was a very clever application launched last October (as a Halloween stunt) called TakeThisLollipop. The name comes from the lesson our parents taught us about taking candy from strangers. The application requires permission to access Facebook information, which most of us quickly grant. What follows is a terrifying glimpse of the wrong person accessing your data. The video includes freak-boy driving to your home with your photo on his dashboard. After the video, I went back to Facebook and reviewed the apps I'd granted permission to over the years and decided it was time to prune. Of course, they already have all my information.

The rules changed over the past few decades. Consumers had an established arrangement with advertisers and agreed to accept ads in exchange for free or cheap stuff--be it a newspaper, a television show, or radio program. The consumer got content and services, but it wasn't so great for advertisers. The pricing was flawed--based on eyeball exposure rather than exposure to prospects. And the notion of eyeballs was a best effort guess.

In the 1992 movie Sneakers, Cosmo explained the shift of power:

"There's a war out there, old friend. A world war. And it's not about who's got the most bullets. It's about who controls the information. What we see and hear, how we work, what we think...it's all about the information!...The world isn't run by weapons anymore, or energy, or money. It's run by little ones and zeroes, little bits of data. It's all just electrons."

Cosmo was talking about how information technology controls the world. Those that control the electrons has a decided advantage. That was 20 years ago, and things have changed ever so slightly. Rather than humans using information to derive wealth, the information now is derived from the wealth of human information. Your information.

Which brings us back to the smartphone in general. Not only does it include our email calendar and address book, but also knows our location, photos, our text messages and more. The Wall Street Journal recently did a report on corporate and foreign surveillance and profiled several companies that legally sell products to hack into IT systems such as FinFisher:

"The company also claims to have allowed an intelligence agency to trick users into downloading its software onto BlackBerry mobile phones "to monitor all communications, including [texts], email and BlackBerry Messenger." Its marketing documents say its programs enable spying using devices and software from Apple, Microsoft, and Google Inc., among others. FinFisher documents at the conference were offered in English, Arabic and other languages."

There are three trends converging that make this a priority to understand.

1.) The ease of tracking information thanks to web cookies, sophisticated websites, and the breadth of information smartphones contain.

2.)Lack of legislation around privacy compared to more mature aspects of the law such as negligence and other forms of consumer protection that give protections by default.

3.) The complexity and ignorance around terms of service and end user agreements that are generally accepted and overly complex.

Google and Facebook know a tremendous amount of information about their users. Microsoft poked fun at "The Gmail Man" because Gmail reads the "free" email to determine the best ads to serve. It is an generally considered an improvement over shotgun advertising (for viewer and advertiser) and allows Google to charge a premium for improved targeting. Few people complain as ads are accepted, so they may as well be more relevant. Though, Google does get it wrong sometimes, as the video shows.

The Facebook "Like" button makes web advertising more social and provides improved measures for ad conversions. It also extends Facebook's tentacles across the web as the Like buttons report informatoin back to Facebook about Facebook user visits, even if unclicked. Combined with Facebook's new "frictionless" sharing, the electronic bread crumbs of our Internet behaviors are turning into loaves. Keep in mind, Facebook audiences easily rival those of prime time television in size--budgets are dramatically swinging from television to the Internet.



COMMENTS


Who's Who at Enterprise Connect

NEC

Featured This Week:
Sponsored By


May 7, 2014
With the imperative to drive innovation and continuously improve business processes, the role of unified communications and collaboration (UCC) is rising in importance for most organization. Executive...
April 24, 2014
Small centers are both excited and nervous about the new wave of innovation converging on them as major disruptive forces - cloud, mobile, big data and social - rock the contact center world. They rea...
April 9, 2014
Recent advances in cloud technology have given rise to wide variety of new tools designed to support contact center performance, staffing and reporting. Join us for a live webinar focused on helping c...

Sign up to the No Jitter email newsletters

  • Catch up with the blogs, features and columns from No Jitter, the online community for the IP communications industry. Each Thursday, we'll send you a synopsis of the high-impact articles, podcasts and other material posted to No Jitter that week, with links for quick access.

  • A quick hit of original analysis by the experts who bring you Enterprise Connect, the leading event in Enterprise Communications & Collaboration. Each Wednesday, this enewsletter delivers to your email box a thought-provoking, objective take on the latest news and trends in the industry.

Your email address is required for membership. For details about the user information, please read the UBM Privacy Statement

As an added benefit, would you like to receive relevant 3rd party offers about new products/services and discounted offers via email? Yes

* = Required Field

No longer instrested? Unsubscribe here.