{"id":11775,"date":"2020-10-24T12:05:14","date_gmt":"2020-10-24T12:05:14","guid":{"rendered":"https:\/\/www.itwriting.com\/blog\/?p=11775"},"modified":"2020-10-24T12:10:36","modified_gmt":"2020-10-24T12:10:36","slug":"cyber-privacy-by-april-falcon-doss","status":"publish","type":"post","link":"https:\/\/www.itwriting.com\/blog\/11775-cyber-privacy-by-april-falcon-doss.html","title":{"rendered":"Cyber Privacy by April Falcon Doss"},"content":{"rendered":"<p>This is a book about pervasive data collection and its implications. The author, April Falcon Doss, is a lawyer who spent 13 years at the US National Security Agency (NSA), itself an organization controversial for phone-tapping and other covert surveillance practices. Disturbing though that is, one of Doss\u2019s observations is that \u201cin democratic countries \u2026 the government doesn\u2019t have nearly as much data as private companies do.\u201d She argues that government-held data is less troubling since its usage is well regulated, unlike privately held data \u2013 though these safeguards do not apply in authoritarian regimes.<\/p>\n<p>Government use then is just one piece of something much bigger, the colossal amount of personal data gathered on so much of what we do, our buying habits, what we search for on the internet, our health, our location, our contacts, tastes and preferences, all tracked, stored, and used in ways that we might not expect. Most of the book simply describes what is happening, and this will be eye-opening to anyone who has not followed the growth of data collection and its use in marketing and advertising over the last twenty years or so. Doss describes how a researcher analyzed his iPhone activity and found that &#8220;within seven days, the phone had exported data via 5,400 hidden app trackers.&#8221; &#8211; and Google&#8217;s Android is even worse. <\/p>\n<p>How much do we care and how much should we care? Doss looks at this question which to me is of particular interest. We like getting stuff for free, like social media, search, maps and directions; but how aware are we of hidden costs like compromised privacy and would we be willing to pay in other ways? Studies on the subject are contradictory; humans are not very logical on the matter, and it depends exactly how the trade-off between privacy and cost is presented. The tech giants know this and in general we easily succumb to the temptation to hand over personal information when signing up for free services.<\/p>\n<p>Doss makes some excellent and succinct points, as when she writes that \u201cprivacy policies offer little more than a fig leaf of user notice and consent since they are cumbersome to read, difficult to understand, and individuals have few alternatives when it comes to using the major digital platforms.\u201d She also takes aim at well-intended but ineffective cookie legislation \u2013 which have given rise to the banners you see, especially in the EU, inviting you to accept all manner of cookies when you visit a web site for the first time. \u201cA great deal of energy and attention has gone into drafting and implementing cookie notice laws,\u201d she says. \u201cBut it is an open question whether anyone\u2019s privacy has actually increased.\u201d<\/p>\n<p>She also observes that we are in uncharted territory. \u201cIt turns out that all of us have been unwitting participants in a multifaceted, loosely designed program of unregulated research,\u201d she writes. <\/p>\n<p>Personally I agree that the issue is super-important and deserves more attention than it gets, so I am grateful for the book. There are a couple of issues though. One is that the reason personal data gathering has escalated so fast is that we\u2019ve seen benefits \u2013 like free services and personalisation of advertising which reduces the amount of irrelevant material we see \u2013 but the harms are more hidden. What are the harms? Doss does identify some harms, such as reduced freedom in authoritarian regimes, or higher prices for things like Uber transport when algorithms decide what offers to show based on our willingness to pay. I would like to have seen more attention paid though to the most obvious harm of the moment, the fact that abuse of personal data and social media may have resulted in political upheavals like the election of Donald Trump as US president, or the result of the Brexit referendum in the UK. Whatever your political views, those who value democracy should be concerned; Doss gives this matter some attention but not as much as it merits, in my opinion.<\/p>\n<p>Second, the big question is what can be done; and here the book is short of answers. Doss ends up arguing that we have passed the point of no return in terms of data collection. \u201cThe real challenge lies in creating sufficient restrictions to rein in the human tendency to misuse information for purposes that we\u2019ve collectively decided are unacceptable in society,\u201d she writes, acknowledging that how we do so remains an open question.<\/p>\n<p>She says that her ambitions for the book become more modest as the research continued, ending with the hope that she has provided \u201ca catalogue of risks and relevant questions, along with a useful framework for thinking about the future\u201d which \u201cmay spark further, future discussions.\u201d<\/p>\n<p>Fair enough, but I would like to have seen more practical suggestions. Should we regulate more? Should Google or Facebook be broken up? As individuals, does it help if we close social media accounts and become more wary about the data that we give away? <\/p>\n<p>Nevertheless I welcome this thought-provoking book and hope that it does help to stimulate the future debate for which the author hopes.<\/p>\n<p><em>BenBella Books (3 Nov. 2020)<\/em><\/p>\n<p><iframe src=\"\/\/ws-eu.amazon-adsystem.com\/widgets\/q?ServiceVersion=20070822&amp;OneJS=1&amp;Operation=GetAdHtml&amp;MarketPlace=GB&amp;source=ss&amp;ref=as_ss_li_til&amp;ad_type=product_link&amp;tracking_id=itwriting-21&amp;language=en_GB&amp;marketplace=amazon&amp;region=GB&amp;placement=1948836920&amp;asins=1948836920&amp;linkId=3998c72c901727649a26343f32519446&amp;show_border=true&amp;link_opens_in_new_window=true\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" style=\"width: 120px; height: 240px;\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is a book about pervasive data collection and its implications. The author, April Falcon Doss, is a lawyer who spent 13 years at the US National Security Agency (NSA), itself an organization controversial for phone-tapping and other covert surveillance practices. Disturbing though that is, one of Doss\u2019s observations is that \u201cin democratic countries \u2026 &hellip; <a href=\"https:\/\/www.itwriting.com\/blog\/11775-cyber-privacy-by-april-falcon-doss.html\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Cyber Privacy by April Falcon Doss<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,1580,1522,1519],"tags":[],"class_list":["post-11775","post","type-post","status-publish","format-standard","hentry","category-book-reviews","category-books","category-privacy","category-tech"],"_links":{"self":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts\/11775","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/comments?post=11775"}],"version-history":[{"count":3,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts\/11775\/revisions"}],"predecessor-version":[{"id":11778,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts\/11775\/revisions\/11778"}],"wp:attachment":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/media?parent=11775"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/categories?post=11775"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/tags?post=11775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}