We’ve always joked that security services were listening in on our email and chat. I suspect many of us thought it was not a joke but it sounded so madly paranoid we didn’t like to admit it. Some of my techy friends steered clear of social networks, others encrypted their email. This sounded a little over the top. Not any more. Thanks to public hero, Edward Snowden, we know the US and UK security services have been illegally intercepting millions of internet based communications (and of course the internet includes telephone) and mining the data for goodness knows what.
And guess what, people don’t like it.
In a recent article referring to “Without Permission: Privacy on the Line” published in the International Journal of Information Security and Privacy, by Johanne Pratt and Sue Conger the editors say:
This feeling of victimization and violation of privacy is the fuel behind the recent public outrage directed toward the NSA and companies utilizing big data in marketing. A recent post on NPR’s blog Monkeysee discusses the differences between the information gathering done by Apple and Target, for marketing purposes, and the government’s motives for data collection:
“Government has no such transparent single motive, like profit, but a variety of motives, not all of which people are confident they know about. What you believe to be the motives of a particular administration or government agency depends on a complicated, often highly charged calculus of politics, policy, media consumption, and internalized constitutional theory that you may not have even verbalized but know in your gut.”
Over the last week I have been having a series of conversations with different project partners about how we should react. We don’t really have anything to hide, nor do we carry commercially sensitive data. But it is just the feeling of outrage at the fact that they intercept and mine our data, Google for commercial reasons and the NSA for perhaps more sinister reasons. We were already uneasy about letting Google have our data. We were already looking for more efficient tools for project management. And I think overall we are looking for systems we can install on our own servers and maintain ourselves. Of course that will not stop intercepts, nor will it stop our data being hacked. But al least we will have some element of control back over how we store and manage our data. Longer term this could have quite profound implications for how the internet develops.