{"id":70328,"date":"2016-02-29T12:33:03","date_gmt":"2016-02-29T12:33:03","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=70328"},"modified":"2016-02-29T12:33:03","modified_gmt":"2016-02-29T12:33:03","slug":"dark-spots-light-spots-and-apples-protest","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2016\/02\/dark-spots-light-spots-and-apples-protest\/","title":{"rendered":"Dark Spots, Light Spots, and Apple\u2019s Protest"},"content":{"rendered":"<p><em>23 Feb 2016 &#8211; <\/em>How\u2019s this for bad choices? A recent study by a Harvard group contended with the position of US intelligence agencies that tracking possible terrorists was becoming more difficult because there are too many <a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2016\/02\/01\/us\/politics\/new-technologies-give-government-ample-means-to-track-suspects-study-finds.html\" >\u201cdark spots\u201d<\/a>\u2014places where data can be encrypted to prevent tracking. Harvard \u201creassured\u201d the FBI, CIA, and others that new technologies embedded in common objects will provide (or already provide) plenty of additional tracking opportunities. What are these? How about toothbrushes, toys (yes, Barbie dolls), television, and light bulbs, just for starters? These are the \u201cInternet of things,\u201d in the cute phrase of one law professor quoted in the article above. But let\u2019s just call them light spots.<\/p>\n<p>I suppose we are intended to feel comforted by the thought that we\u2019re safe on both ends of the surveillance machine\u2014the intelligence community\u2019s and the corporations\u2019. Obviously, those of us who are still worrying about how Facebook, Google, and Amazon\u2014the Big Three of Social Monitoring\u2014keep us (and the authorities) in their sights are not thinking ahead. We have already surrendered our privacy to them by signing up every day for their services, and by standing by while they willy-nilly transfer data to government agencies.<\/p>\n<p>Europe\u2019s national regulators, as distinct from the European Commission, suspect that the latest US-EU \u201cPrivacy Shield\u201d agreement on personal data transfer does not adequately safeguard privacy. All 28 EU member-states must sign off on the agreement for it to take effect. They want assurances that Europeans\u2019 private information will not find its way into the hands of US intelligence services. I doubt the Big Three will provide them. And if they do, who would believe them?<\/p>\n<p>Like most Europeans, Tim Cook, CEO of Apple, believes that some dark spots deserve protection. Reminding us that we the consumer are \u201cthe product\u201d and not really the customer when it comes to tracking of our likes and dislikes by Facebook et al., Cook has emerged as a stout defender of privacy against the demands of the FBI in the <a target=\"_blank\" href=\"http:\/\/www.apple.com\/customer-letter\" >San Bernardino terrorism case<\/a>. He so far has rejected the US government\u2019s demand, backed by a court decision, to unlock Apple smart phones in order to access one terrorist\u2019s data. Correctly, Cook sees surrendering to this request as having the potential to open the floodgates, allowing either the government or criminals to gain backdoor entry to people\u2019s private information. Cynics might say that he really wants to protect Apple\u2019s proprietary encryption software, which evidently is much stronger than Google\u2019s and the other giants\u2019. And clearly, Cook is concerned about the integrity of the Apple brand. But motives aside, Cook\u2019s action is laudable.<\/p>\n<p>Interestingly, Cook\u2019s impassioned defense of privacy has detractors and fence-sitters in the high-tech community. Everyone among them want to protect their security systems. But those companies which, like the Big Three, rely on Internet advertising and personal data entries to monitor tastes and movements will be loath to support Cook\u2019s tough stand\u2014all the more so if they have contracts with police departments and federal agencies, such as Amazon\u2019s with the CIA and Microsoft\u2019s with the Department of Defense. But those which, like Apple, mainly sell hardware <a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2016\/02\/19\/technology\/tech-reactions-on-apple-highlight-issues-with-government-requests.html\" >are likely to support him<\/a>.<\/p>\n<p>In the end, Apple may have to concede at least to providing the specific data the FBI is demanding. But let\u2019s not lose sight of the core issue. We\u2019re all in a bitter struggle to preserve our freedom of thought and movement against the rising tide of security-firsters who will forever contend that sacrificing our privacy is necessary if we are to erase the dark spots. By their logic, 1984 is finally here, and embedding security (i.e., surveillance) chips in toothbrushes, children\u2019s toys, and everywhere else The Enemy might lurk is both necessary and proper. You\u2019d better consider flossing regularly and having your kids play with sticks and stones. Barbie is watching, and even Tim Cook can\u2019t stop her.<\/p>\n<p>_________________________________________<\/p>\n<p><em>Mel Gurtov, syndicated by <\/em><a target=\"_blank\" href=\"http:\/\/www.peacevoice.info\" ><em>PeaceVoice<\/em><\/a><em>, is Professor Emeritus of Political Science at Portland State University and blogs at <\/em><a target=\"_blank\" href=\"http:\/\/www.mgurtov.wordpress.com\" ><em>In the Human Interest<\/em><\/a><em>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By their logic, 1984 is finally here, and embedding security (i.e., surveillance) chips in toothbrushes, children\u2019s toys, and everywhere else The Enemy might lurk is both necessary and proper. You\u2019d better consider flossing regularly and having your kids play with sticks and stones.  Barbie is watching, and even Tim Cook can\u2019t stop her.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-70328","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/70328","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=70328"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/70328\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=70328"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=70328"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=70328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}