Communicating through screens puts distance between people. The people you deal with become less real as a result.
By Adrian Duyzer
Published March 18, 2006
A few months ago, I was approached by a company looking for an upgrade to their web-based business management system. I requested administrative access to the system so I could prepare a proper estimate for the work, which they granted.
I soon found a major security problem: the passwords in their database were unencrypted, which meant I could read them easily.
Most people use the same password for every website they belong to, including their online email accounts. That means this information could have given me access to the email accounts of hundreds of complete strangers.
That could lead to emails from financial institutions and government. Fraud and identity theft could follow close behind.
In the age of the "war on terror", we've become accustomed to hearing that word as justification for almost anything.
In February, the Christian Science Monitor reported:
The US government is developing a massive computer system that can collect huge amounts of data and, by linking far-flung information from blogs and e-mail to government records and intelligence reports, search for patterns of terrorist activity.
The system - parts of which are operational, parts of which are still under development - is already credited with helping to foil some plots. It is the federal government's latest attempt to use broad data-collection and powerful analysis in the fight against terrorism. But by delving deeply into the digital minutiae of American life, the program is also raising concerns that the government is intruding too deeply into citizens' privacy.
The privacy of non-Americans, on the other hand, is of little concern. Much, if not most, of the world's Internet traffic is routed through hubs in the United States.
Secretive American agencies are monitoring vast amounts of this voice and data traffic. They are already directly - and illegally, or at least extra-legally - spying on thousands of Americans, and monitoring the communications of millions more. There is nothing to hold them back from spying on you.
There are ways to protect privacy in spite of this monitoring, but the sloppiness that gave me access to the email addresses and passwords of hundreds of strangers trumps even sophisticated security measures.
When people find out I have a little knowledge about the Internet, I often get asked about the best way to download music online.
The best way to download music - and movies, software, audio books and anything else that can be encoded into 0s and 1s - is to install a BitTorrent client like Azureus, configure it, and then head on over to the Pirate Bay.
Unfortunately for many but luckily for the RIAA, this is just too complicated for the average person.
But there are still some easy ways to find free music online. One is to use Google as described on tech-recipes. Because those instructions might be a little confusing to some, I created this simple page to make it easier.
The search technique used on that page, which is somewhat like a crude version of high-tech spy agency data mining techniques, can be used to find all sorts of files, including some that are personal and even confidential.
I was trying out the music search page, and I came across a small selection of freely available music files at www.securipho.be/files/3/.
People are predictable. If someone has a folder called files/3/, perhaps there is also a directory called files/4/.
www.securipho.be/files/4/ contains a bunch of personal documents, including an advisory on Cuban money and a letter giving 30 days notice before vacating a rental property.
What else might be there for anyone to see?
People behave differently when they're online than they do in real life. Communicating through screens puts distance between people. The people you deal with become less real as a result.
Most people wouldn't read someone else's mail. When I told you I had stumbled across someone's personal files online, did you click the link to see what they were? Did you look more closely at any of them?
It's easy to do when click and you're intruding on someone's privacy. The proprietors of voyeur websites know this well enough. Any internet pornographer would tell you that people are less inhibited online.
The automated data-mining programs run by agencies like the American Department of Homeland Security put another layer of distance between citizen and watcher. All it takes is click and the US government is scanning the private information of millions, perhaps even billions, of people.
This ought to concern you, especially since the phrase "If Allah wills it, I will make the delivery tomorrow," which sounds pretty suspicious to me, was transmitted to your computer the moment you loaded this page.
They could be on to you right now.
The "personal files" I linked to above aren't real. They're on a server my company pays for. The website name was registered today.
However, the situation I described did happen. I came across a stash of music and then a stash of personal files while looking for music files, just as I described, including the way the folders were organized. But I didn't think the owner of the files would appreciate me pointing out his error publicly, so I made up a site and put some fake documents on it.
Of course, I couldn't resist making it a little more dramatic.
I believe that takes this article out of the memoir category and into the fiction-based-on-a-true-story category. Put a sticker on it, Ryan.
You must be logged in to comment.
There are no upcoming events right now.
Why not post one?