Introduction

“Any sufficiently advanced technology is indistinguishable from magic.”

Arthur C. Clarke

The idea of privacy is that each human being should be able to decide who has information about them. It's an interesting concept: each person creating an island of data and limiting access to the island only to other entities the individual permits.

In practice, it doesn't work, meaning it's both impossible and incredibly harmful to everyone when privacy “rights” are imposed and enforced. This is true for a number of reasons, including human nature, modern technology, and the way data functions and affects interaction.

Today, many people say they want privacy—that they value control of their own information. There is an almost innate, reflexive horror at the idea that someone, anyone, could know something about us that we did not want them to know. Many of us do not feel comfortable with this idea: what if you had no privacy—what if everything you ever did or said was known to everyone else? Each of us may have a different image of the form of that discomfort. Who knows everything about me—the government? Corporations? My spouse? And what would they do with that information? Harm me? Track me? Sell things to me? When we conceive of a dystopia, fictional or real, that depiction usually includes some aspect of loss of personal privacy, from the Big Brother intrusive government of George Orwell's 1984 (the archetypical dystopia)1 to modern North Korean governmental control of its citizens2 to the constant and ubiquitous monitoring of our online activity by the behemoths of the Internet, from Google to Facebook to Apple to Amazon.3 We fear anyone that has the totality of information; if someone knows everything about me, maybe they can control me. I, myself, prize my privacy and loathe the notion that someone else knows something about me that I did not want them to know.

And yet … we want to know everything about everyone else. We are naturally curious—no, not curious: nosy. We crave gossip and innuendo and accusations; we want to know what happened and when and to whom. We have entire industries thriving on the practice of gathering, analyzing, and distributing information about other people for our consumption.4 5 6 7 8 9 10 This desire runs exactly counter to our claim that privacy is important, or, at least, it suggests that we want privacy for ourselves, but nobody else.

But what if there was no privacy, for anyone or anything, at all? What if everyone knew everything about everyone else?

Imagine if you could view video from every camera in the world … could listen in on every microphone … could view every person's browser feed … could watch every satellite feed … in real time, unadulterated, any time. But also imagine that every other person had the same ability: your neighbor, your parents, your kids, your co-workers, your friends, and total strangers. What if we could all access every piece of data, live or recorded, at will?

In this book, I'm going to make the case that a world without privacy would be the optimum outcome: all data, everywhere, known to everyone. It's disconcerting; on a very personal level, I don't like the feeling I get when I consider this idea, and I think most people feel the same way. But, rationally, using objective reason instead of emotional reaction, it makes much more sense than the ultimate (unobtainable) goal of every individual having total control of information, and it is absolutely preferable to the bizarre patchwork of information disparity we currently have, where certain people and institutions have access to particular information, others have access to different sets of information, and each individual person has only limited glimpses of the whole.

The Purpose of Privacy

To begin with, it's good to dissect why this idea makes us feel uncomfortable. Why do we want (or think we want or say we want) privacy? For the most part, we think privacy will give us security; the two words are often used together, sometimes mistakenly synonymously. For most of my life, I have worked in industries where the collection, distribution, and protection of information was valuable: the military, journalism, teaching, and computer security. For security practitioners, one of the fundamental premises is called the Triad of security goals: confidentiality, integrity, and availability.11

  • Confidentiality: Only authorized people can get access.
  • Integrity: Only authorized transactions are allowed.
  • Availability: The asset exists when authorized people are authorized to make transactions.

From this perspective, privacy is usually perceived as an aspect of confidentiality; individual people want control of the confidentiality of information that identifies them. And confidentiality isn't used just for personal privacy; it's used to secure data and assets in all types of activities, organizations, and business. We've depended on confidentiality as part of our effort to attain security for so long that it's hard to imagine being secure without it; it's a cornerstone of the security profession.

But it's not necessary. In fact, confidentiality often inhibits security.

For example, one of the desires we have about privacy is to protect ourselves financially—we don't want anyone else knowing our bank account information or the credentials we use to access the account (passwords, identification cards, bits of information like name and address and birthdate, etc.). Banks spend a lot of money protecting these credentials,12 and we expend effort creating and maintaining them. All of this effort has a financial cost, which negatively impacts the financial benefit of the process and investment. Every amount the bank spends on securing the transaction is an amount charged to the customer, either through direct fees or in reduced interest on the investment—you would make more money with your account if security wasn't an additional cost of the process. This is all to prevent fraudulent transactions—someone pretending to be you in order to get your money.

But this can happen only because the criminal has privacy. If all of the information about all of the transactions, legitimate and fraudulent, is known to everyone, then there is no opportunity for theft. If the bank knew when someone other than you tried to take your money, the bank would not give the money to that person. If every action of every person is known to every other person, no transaction fraud could exist. A criminal can't engage in theft by fraud if we all know what the criminal is doing and who the criminal is.

Total transparency, then, directly counters the need for confidentiality … and improves the lives of everyone involved, because we no longer have the costs associated with the need for confidentiality, and we can all then derive the greater benefits.

Going to Extremes

Take this to an even greater extreme and get weird with it: why do we even have banks? Again, it's a perceived need for security, based on money. We put our money in a bank so that someone else doesn't take our money without our permission. But … if everyone knows everything about everyone else, we would know if someone without permission took money from someone else. We would know if a crime was committed, and we would know who the rightful owner of the money is. The need for banks would be greatly diminished or dissipate altogether … and the cost of banking would similarly evaporate, and each individual person would get greater value from their own money.13

If what I'm describing is starting to make you feel uncomfortable and the idea of everyone watching your every action is creeping you out, that's understandable and completely normal. I'm not trying to describe a police state where you're being watched by law enforcement every moment of every day. Forget the how of this proposal for the moment; I'll get into theoretical mechanisms for achieving these goals throughout the book. (And, to be clear, I do not have a comprehensive way of accomplishing these goals. Putting these theories into practice will require the contribution and coordination of many experts, organizations, and thinkers. This book is intended to be a catalyst to start that conversation. But I think the discussion in society about privacy thus far has been overwhelmingly one-sided: everyone seems to be pursuing ways to implement and mandate more privacy, not less, as a means to ensure security. I think they're mistaken.)

It's worth noting that some jurisdictions (some cultures, some populations) value privacy in different ways. For instance, the European Union, right now, has decided that personal privacy is a human right, tantamount to living; this is codified and mandated by the General Data Protection Regulation (GDPR), which gives some power to individuals in terms of imposing who can or cannot disseminate their personal data.14 This law also gives an even greater amount of power to the governments of the European Union, as enforcers acting on behalf of the individuals they supposedly protect. This law is mimicked around the world; similar statutes exist in countries such as Japan,15 Switzerland,16 Australia,17 Canada,18 Argentina,19 Singapore,20 Israel,21 and others, as well as the American states of California22 and New York.23

Other jurisdictions, on the other hand, have laws and practices that are in direct opposition to personal privacy. China, for instance, has laws that require that the government have access to all online activity, including the ability to monitor the action/communication of each individual.24 In the same vein as the European Union's justification for the GDPR, China's rationale for monitoring is to protect the citizenry. But unlike the EU, which purports to protect individual privacy, China's stated intent is a different excuse for police powers: Chinese authorities want to protect society from criminals who operate in secret or prevent disruption of society that might result because of “bad” information or influence.

Meanwhile, in the United States, prevailing national law runs exactly counter to the very idea of privacy: instead of each individual having an absolute right to privacy, each individual has an absolute right to free expression. This is codified in the US Constitution and in the First Amendment (twice, in fact, as both the freedom to say what you want and the freedom to distribute/publicize what you say—freedom of speech and freedom of the press).25 So instead of you telling me what I can say about you, I can say anything I want about you, to anyone or everyone. That applies regardless of whether “you” means an individual, a government, or a corporation. Perhaps not surprisingly, this approach of freedom of speech, combined with transparency, will be most in line with the argument for improving the human world I'll make throughout this book.

Please Indulge Me

I'm going to ask for your indulgence as you read the rest of the book. It might seem, in a few places, that I'm suggesting that a police state is somehow preferable to personal privacy—that is definitely not the case. In fact, I think it is much more likely that privacy laws create a situation for a police state to grow and flourish. I prefer personal, individual freedom over all other things. It might also seem like what I'm describing is science fiction—that what it would take to achieve total transparency is impossible. I ask you to momentarily suspend your disbelief for the purpose of this discussion and examine the topic objectively, from the perspective of the desired end-state, and not the complications of the possible implementations.

Finally, it's probably best we all agree that there is no actual privacy (or that there probably never really was): someone knows everything about you. Not that any one person knows all the things—but all the people who know things about you could get together and assemble all that data and nothing you've done or said would be private anymore. Someone, somewhere, singly or collectively, has all of it—whether that someone is the government, corporations, or trusted loved ones, you have no privacy. You have an illusion of privacy, or the faux privacy of anonymity. These are not worth the expense and cost that the false benefit of “privacy” supposedly provides.

Premises

Secrecy is not security; confidentiality is only one leg of the Triad. If other legs of the Triad are violated/abrogated, we can lose security just as easily as if we lost confidentiality. Privacy is not security—but we often think privacy will give us security. Privacy requires secrecy; if you cannot enforce confidentiality, you have no privacy.

In the rest of this book, I’m going to describe ways that privacy and secrecy hinder actual security, or how security (whether attained through confidentiality, integrity, or availability) can harm people. It’s important to understand that what we say we want, or what we think we want, is not something that is actually beneficial or useful (or at least as not as beneficial/useful as we think, especially compared to other choices). Privacy is not a magical solution to perceived problems, and privacy might actually cost each of us more than the potential benefits it provides. We might all benefit more, as individuals, from security methods other than limiting access to our own data islands. And other approaches would not incur the costs privacy requires.

Another premise: to properly discuss privacy, we need to discuss adult topics, because we, as people, usually want privacy for adult reasons (financial, sexual relationships/activity, death, business, etc.). This book will deal with those topics in frank and adult terminology—if you're uncomfortable with adult conversation, you may find parts of the book uncomfortable.

Finally, while reading the rest of the book, try to imagine that each person on the planet has a magical capacity to view and hear everyone else on the planet: a television set that can be instantly tuned to any other person, anywhere, that not only displays real-time data, but all prior activity—all historical actions and speech of every other person.

I'm not using this premise because I'm excited about the potential; from the perspective of someone who was raised in a culture that respected privacy and someone who has been engaged in the practice of security in one way or another for most of my adult life, this premise seems awkward, intrusive, dangerous, and makes me very uncomfortable.

But my personal feelings/biases don't matter: I also realize that the future I'm describing is almost here, and that it is inevitable. While I'm not relishing its arrival, I'm trying to view it as objectively as possible, and I anticipate the pitfalls and predict the opportunities. I know the situation that brings me discomfort is upon us, and I know that we can exacerbate the danger and difficulty of the transition from a private world to the post-privacy world, if we approach it with obsolete tools and philosophies.

And that magical TV set is just a step away from what we have right now—and it's only magical in Arthur C. Clarke's sense of technological sophistication. It would be better if we could start figuring out how to use our next magical tool instead of pretending it will never arrive.

How to Contact the Publisher

If you believe you've found a mistake in this book, please bring it to our attention. At John Wiley & Sons, we understand how important it is to provide our customers with accurate content, but even with our best efforts an error may occur.

To submit your possible errata, please email it to our Customer Service Team at [email protected] with the subject line “Possible Book Errata Submission.”

Notes

  1. 1   Orwell, G. (1955). 1984. New York: New American Library
  2. 2   www.hrw.org/world-report/2019/country-chapters/north-korea#
  3. 3   abcnews.go.com/Technology/ceos-amazon-apple-facebook-google-face-congressional-antitrust/story?id=72034939
  4. 4   www.tmz.com
  5. 5   people.com
  6. 6   starmagazine.com
  7. 7   marketingplatform.google.com/about/enterprise [formerly DoubleClick]
  8. 8   www.cambridgeanalytica.org
  9. 9   www.lexisnexis.com/en-us/products/public-records.page
  10. 10 www.equifax.com/personal
  11. 11 www.elsevier.com/books/the-basics-of-information-security/andress/978-0-12-800744-0
  12. 12 www.americanbanker.com/articles/financial-firms-to-further-increase-cybersecurity-spending
  13. 13 Granted, banks provide services other than protecting savings, such as commercial/residential loans and currency exchange.
  14. 14 General Data Protection Regulation, OJ L 119, 04.05.2016 § (EU) 2016/679 (2018)
  15. 15 iapp.org/news/a/gdpr-matchup-japans-act-on-the-protection-of-personal-information
  16. 16 www.admin.ch/opc/en/classified-compilation/19920153/index.html
  17. 17 www.oaic.gov.au/privacy/the-privacy-act
  18. 18 www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/the-personal-information-protection-and-electronic-documents-act-pipeda
  19. 19 servicios.infoleg.gob.ar/infolegInternet/anexos/60000-64999/64790/texact.htm
  20. 20 www.pdpc.gov.sg
  21. 21 www.gov.il/en/Departments/the_privacy_protection_authority
  22. 22 leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=201720180AB375
  23. 23 www.dos.ny.gov/coog/pppl.html
  24. 24 www.chinalawblog.com/2019/09/chinas-new-cybersecurity-program-no-place-to-hide.html
  25. 25 www.law.cornell.edu/constitution/first_amendment
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.227.46.229