Do people really want internet privacy, or do they just want control over what content they share is seen and by who? It's no great mystery that what you publish online stays online, so what is the main issue people have with "the government stalking my Facebook"?
Cloud technology can be used for surveillance and tracking its users in many ways. In his book, “To the Cloud”, Vincent Mosco explains some of the negative consequences that can result from Cloud Computing technology. Detailed under the subheading ‘Privacy and Security’ he identifies the surveillance ability as one of the most worrisome threats or what he calls “dark clouds” that are forming within this seemingly safe and durable service. While it may appear to be a terrible invasion of privacy to the individual users, what is the worst thing that could happen to a user who is a good, honest person and global citizen if their data was compromised? In many common contexts, very little damage would be done.
While revelations about personal information can be embarrassing or just plain irritating, it is important to keep in mind that it was the user themselves that shared it in the first place. The online world like the real world is becoming increasingly globalised and interconnected. Once something is published in digital form, it does not simply vanish from existence when you press delete, it could be very much alive somewhere, even within a backup generator in a Cloud system. While it seems we have the power to protect our accounts with ‘privacy settings’ and limit the audience of who sees our content, this is a façade, an ability that is completely out of our hands. According to Buchmann, “In the Western World, personal privacy concerns an individual freedom of self-determining how to reveal oneself in the ongoing interplay of the social world” (Buchmann 2013, p.18). Mosco however explains, using Facebook as an example that even if you set a post to be viewed by friends only, that doesn't mean a government official or a member of a data collecting service could not gain access to it. Even though people know this, sites such as Facebook really do make users feel like they own that space thus, “Right or wrong, if you want to know about someone, look on Facebook because that’s sort of where they bare their souls to the world.” (Taylor & Francis 2012, p. 97). This is the reality of the online space, one that is not a big mystery in this day and age.
One of the main issues that the government is concerned about is of course national security. Terrorism, while it is indeed seen and felt through physical displays is increasingly being organised and sourced online. According to Rudher, pro-terrorism jihad preachers are calling people to become “internet mujahidden”, meaning people undertaking jihad via an online space. They do this “…by setting up dedicated websites to cover specific areas of jihad, such as news about jihadist activities and operations or jihadist literature, what he termed ‘WWW Jihad” (Rudner 2016, p. 27). In terms of activity surveillance, web searches made by individual users can be recorded. This is a way of trying to stop acts of terrorism before they happen and also to stop harmful lines of communication between people who pose a danger to a great number of others. Mosco highlights his disgust in the nosiness of the government with a hypothetical example of a person being associated with terrorism after searching for pressure cookers and backpacks. While this is quite a hyperbolic statement, lets take it as a literal case. If this person were innocent, wouldn’t such suspicions easily be resolved? The rule of law is that a person is innocent until proven guilty thus, if there isn’t any proof, there is no ramification for the accused. While it could indeed be inconvenient or creepy that they know what you are ‘Googling’ in your free time, isn’t it always better to be safe than sorry? When put into perspective, the physical safety of a country or even a small community should definitely be prioritised over personal privacy in many cases. Mosco displaces his fear; instead of being worried about the government actively taking measures into preventing terrorism before it happens, he should be afraid of individuals such as himself who would rather keep their personal hobbies a secret.
In truth, the people who have something sinister or illegal to hide are the only ones who are really ‘in danger’ when it comes to Cloud computing technology. The ‘threat’ on everyday citizens is almost non-existent or trivial at best. A media text, which demonstrates this idea, is Jake Kasdan’s 2014 American comedy film, Sex Tape. The film is about an ordinary married couple, Annie and Jay, who attempt to spice up their love life by making a sex tape using their iPad. After making it, Jay forgets to delete it and the video is synced to the Cloud, making it viewable to all of their friends and family. After some seriously crazy shenanigans, they are able to get the final drive back that contains a copy of the film. After watching the humiliating video once, they both physically destroy the drive eccentrically by smashing and burning it. A stressful verbal exchange between Annie and Jay in their car became the iconic quotation from the film:
“Jay: It went up! It went up to the cloud!
Annie: You can’t get it down from the cloud?
Jay: Nobody understands the cloud! It’s a mystery!”
Ignorance of how Cloud computing works is very true among the majority of its users. This fact is also acknowledged by Mosco and emphasised when he says some people even think the cloud has something to do with the weather, an actual ‘cloud’. While this is problematic to an extent, how harmful is this? The threat of the video getting out is the complication of the narrative. It could cause damage to Annie and Jay’s reputation but is definitely more annoying and embarrassing than dangerous. Even if the video did make its way onto the Internet and seen by the public or was seen during surveillance procedures and viewed by government IT officials, it isn’t incriminating or out of the ordinary. Once put into context, the video would clearly be viewed as a silly mistake made by people within the aforementioned majority that believe they can use technological spaces like personal, secret diaries. Even out of context, the reason they made the tape is clear and not at all unheard of. The story is funny because it is cringe-worthy, and cringe-worthy because it is relatable; very many people within the target audience have something in cyber form they wouldn't want others to see.
Cloud technology is also being used for surveillance purposes closer to home. In August this year, the New York Post posted an article by Michael Kaplan with the title: ‘Catching a Cheating Partner Has Never Been Easier’. The article discussed how women and men on occasion have used the Cloud to catch their partners in the act of marital infidelity. They set up small video cameras in their homes before leaving for business trips that were connected to the Cloud, so the footage could be accessed from their personal devices while physically being far away. Some people in the article have used the footage for divorce cases. This surveillance is interesting as it demonstrates the ability of the camera to be an all-knowing eye, a recordable, unbiased “eye-witness” account that can even stand up in court. If you tried to see this as a negative innovation, the idea of being watched is a ‘creepy’ notion but only the people that are doing the wrong thing are suffering as a result of it. This form of surveillance is really no different from shop security cameras that are used to catch thieves. Being watched doing completely ordinary and legal everyday activities should be something you should accept if you want to live in peaceful and secure environment.
In his book, Mosco makes a point that cloud data Internet takes away people’s ability to self-develop and also makes personalities a commodity as what we search and engage with online can be used to collect data for commercial marketing purposes. Firstly, there is nobody and nothing making a person use cloud technology or the Internet at all.
If you feel the need for privacy and separateness from the Internet to develop yourself, you can just do it! In addition, no one makes you write or share anything you do not want to. On social media for example, people could keep their personal profile simple and go out into the real world and discover themselves. As well as this, what is most problematic about this entire fear of invasion of privacy is that it is not really about ‘privacy’ at all. If people were worried about people finding out about them, they would not engage in online spaces. Lack of control over how people see them is the real fear. Going back to the illusion of ownership over online spaces, some feel that by allowing a selected audience to see certain information, they can manufacture an online identity for themselves (Wilken & McCosker 2014). Technologies that can share information involuntarily are frightening in this way.
In regards to the threat of commercial use of information, how is this a bad thing? While it may at first seem terribly sneaky or volatile, what is really being done is good for both the users and the commercial companies. Commercialism is not the enemy but rather is an essential feature of society. The economy must go on. By collecting information on what people like through surveillance, they can find out what they need to produce and sell without having to inconvenience consumers by waving surveys in our faces and having to conduct expensive target audience research projects. When viewed in this way, surveillance information gathering by commercial companies goes beyond being convenient to consumers as they can help them do a better job of providing what they need and want to buy without having to change their normal activities at all. Worry or irritation about this kind of surveillance is completely unfounded and irrational.
In conclusion, Cloud technology can be used for surveillance and tracking its users in many ways. It can be utilised for serious purposes such as by the government to locate terrorist plots, on a domestic level and for commercial purposes. In his book, “To the Cloud”, Vincent Mosco explains under the subheading ‘Privacy and Security’ that the surveillance ability is one of the most worrisome threats or what he calls “dark clouds” that are forming within this seemingly safe and durable service. When looked at closely and put into practical contexts, the negative consequences that fall under this category are minimal and frivolous. The Cloud Computing technology’s surveillance ability creates transparency within the online and digitalised environment. While sometimes transparency is not welcomed, secrecy is not a reasonable expectation as control over one’s own content is limited. While it may at first appear to be a terrible invasion of privacy to the individual users, what is the worst thing that could happen to a user who is a good, honest person and global citizen if their data was compromised? In many common contexts, very little to no true damage would be done. While this is a conservative view, it is a practical one.
References
Books:
Buuchmann, J. (2013), Internet Privacy: Options for Adequate Realisation, Springer, Berlin, Heidelberg
Collins-Mayo, S & Mayo, B. & Savage, S. (2011), Making Sense of Generation Y: The World View of 15-25 Year Olds, Church House Publishing, London
Mosco, V. (2014), To the Cloud: Big Data in a Turbulent World, Paradigm Publishers, New York
Rudher, M. (2016) ‘ “Electronic Jihad”: The Internet as Al-Qaeda’s Cataylst for Global Terror’, Violent Extremism Online: New Perspective on Terrorism and the Internet, Routledge, New York
Taylor & Francis. (2012), Internet and Surveillance: The Challenges of Web 2.0 and Social Media, Routledge, New York
Wilken,R. & McCosker, A. (2014). ‘Social Selves’, The Media and Communications in Australia, 4th ed, Crows Nest, Allen and Unwin, Australia
Websites:
IMDb. (2014), ‘Sex Tape (2014) Synopsis’, http://www.imdb.com/title/tt1956620/synopsis?ref_=tt_stry_pl
Accessed on 3/9/16
Kaplan, M. (2016), ‘Catching a Cheating Partner has Never Been Easier’, http://nypost.com/2016/08/11/catching-a-cheating-partner-has-never-been-easier/
Accessed on 4/9/16
TechTarget. (2015), ‘Expert Insight: Cloud Computing Defined’, http://docs.media.bitpipe.com/io_10x/io_100433/item_419064/HPandIntel_sCloudComputing_SO%23034437_E-Guide_052611.pdf
Accessed on 2/9/16
Videos:
FilmIsNow Movie Trailers. 2014, Sex Tape Official Trailer(2014) HD, online video, 24 April, viewed on 2 September 2016, https://www.youtube.com/watch?v=WZoe4mMXcv4