Google received little more than a slap on the wrist from Australian authorities following the furore after is was â€˜caughtâ€™ and admitted capturing Wi-Fi data and personal information during its Street View image and mapping exercises. The â€˜incident,’ which generated heated debate in the Australian parliament and is being duplicated in at least six other countries, raises far-reaching questions for governments, regulators and private enterprise on just how far private information can be collected, used and even compromised.
The boundaries are becoming increasingly blurred. On the one hand we have governments demanding access to calls and data being transmitted across privately telecommunications networks in the name of national security. On the other, we have communications service providers (CSPs)and companies like Google and Amazon collecting data on customer usage in order to profile them for the purposes of offering tailored searches and product offerings in real time, supposedly making the userâ€™s online experience more pleasurable.
The concept of an internet that is the network of the people, free of restraint by governments is coming under increasing pressure as well. The â€˜net neutralityâ€™ debate in the USA highlights just how dangerous meddling with freedom can be. The idea that the leader of any country should have the ability to â€˜killâ€™ the internet in times of national security threat is dangerously ludicrous. If ever enacted whole economies would be crippled instantly, utilities that use the internet to monitor resources such as dams and power stations would be left exposed, security, banking and cloud services would come to a standstill – the list goes on and on. One act of â€˜national securityâ€™ could bring a country to its knees without a shot being fired.
The Indian government is pushing even further by having all network critical software supplied by foreign companies subject to independent examination to ensure that it is â€˜spyware free.â€™ The very same government is also insisting that its agencies have access to all telecommunications networks to monitor for activity that could compromise national security, but what guarantees are there that this information will not be used for less critical purposes such as snooping on political opponents, tracking down suspected criminals, etc.?
Less dramatic, but equally pervasive is the idea of filtering networks to prevent â€˜undesirable dataâ€™ from being transmitted is nothing short of censorship. Many governments are already filtering out pornographic, religious and evocative content from websites they donâ€™t happen to like. The concept of protecting citizens from bad things is not only flawed it is repressive and reminds us of regimes in the not too distant past that collapsed using similar methodologies, but only after doing some serious damage.
Getting back to the basic privacy issue, although the objectives of governments and enterprise may be radically different the means of implementation are dramatically similar. The administration of the filtering and data gathering has to be done at network level and most likely by the CSP. Whether governments introduce legislation forcing CSPs to provide them the tools to access the data or if the CSPs themselves collect the data to use for profiling, targeted advertising or to sell to third parties, it is the CSPs that will foot the bill.
Letâ€™s not underestimate the potential cost of these exercises, the processes involved and the security and regulatory issues surrounding them. As if CSPs donâ€™t have enough issues to contend with trying to be profitable businesses. The TM Forum already has a number of initiatives working on parts of this puzzle. No doubt, as pressure on CSPs mounts, more will look to organizations like the Forum for guidance. The bigger question is whether we, as an industry, can do anything about it.
As usual, you present an interesting subject to ponder. The pressure isn’t just on the CSPs. Almost every service provider (hosting, internet, health care, retailers, and so on) will endure costs associate with some form of security or user privacy regulation. Those costs are past on to the users of their services. On the upside, we will see the rise of companies who will happily play the ‘big brother’ space. (Yeah, job creation!)
While the technologies in our lives today make this seem like a recent problem, this topic has been around for centuries and is fraught with ethical, financial and privacy concerns. George Washington, in response to demands of the people for the young government to address terrorism said, ‘…those that give up civil liberties in the name of freedom deserve neither.’ The difference today seems to be that individuals are so freaked out about ‘terrorism’ that they are handing willing governments the power to invade their privacy. While Google dashboard exemplifies a slick way to get people to agree to the monitoring of their actions knowing the data will be ‘stored’ long periods of time. Either method poses the same threat on our civil liberties and privacy. I’m not optimistic that we can do anything about it. Unfortunately George Orwell isn’t required reading in elementary school. 😉