Page 90 - Privacy in a Cyber Age Policy and Practice
P. 90

THE PRIVACY MERCHANTS  77

           individual private trait that a user is not willing to disclose (e.g., political
           or religious affiliation).” 11
             Some individuals may think that they can protect themselves from
           tracking and dossiers by using pseudonyms and multiple “mailboxes.”
           However, some companies have developed software to match pseudonyms
           used on message boards and blogs with real names and personal e-mail
                   12
           addresses.  The subjects of this tracking—who are unaware that their
           anonymity has been stripped—include people who use online pseudonyms
                                                  13
           to discuss sensitive topics such as mental illness.  As Eli Pariser reports,
           “Search for a word like ‘depression’ on Dictionary.com, and the site installs
           up to 223 tracking cookies and beacons on your computer so that other
                                                14
           websites can target you with antidepressants.”  Although the privacy of
           medical records is protected by law, but “visits” to medical websites or chat
           groups are not afforded the same protection.
             Many companies claim that they do not collect names or that they
           disassociate names from dossiers. However, at least some companies keep
           a database of names on file. One such company, RapLeaf, states that it does
           not share its subjects’ names with advertisers; but an investigation found
           that it does link those names to “extraordinarily intimate databases [. . .]
           by tapping voter-registration files, shopping histories, social-networking
                                      15
           activities and real estate records.”  And although the company indeed
           refrains from specifically sharing names with its clients, it did share person-
           ally identifiable information with them, such as unique Facebook account
           numbers that can be traced back to the account holder’s name. 16
             Privacy advocates have sharply objected to the government’s use of deep
           packet inspection (DPI)—a powerful tool used to analyze the contents of
           communications transmitted over the Internet—in large part because it
           is much more intrusive than merely tracking who is communicating with
           whom. (The difference is akin to reading letters versus examining the out-
           side of an envelope to see who sent the letter and to whom it is addressed.)
           Now, private companies are offering to perform DPI for Internet service
           providers to facilitate targeted advertising. 17
             In 2010, Facebook became the most-visited website in the United
                18
                                                       19
           States,  and it neared 700 million users in June 2011.  Facebook users
           put great amounts of personal information, including their religious and
           political views, educational and professional background, interests, as well
           as photos and videos of themselves, on their individual profiles. Most impor-
           tant, unlike most other websites where individuals employ usernames or
           pseudonyms, Facebook is designed for people to use their real names. This
           makes it vastly more valuable to data miners who seek to gather personally
           identifiable information in order to assemble dossiers on individuals. Fur-
           thermore, each individual’s profile is linked to the profiles of their “friends,”
   85   86   87   88   89   90   91   92   93   94   95