In todays more advanced digital societies, more and more of
public communications and information are moving to platforms being run by commercial companies that are not just looking to provide a service to its users and primarily
concerned with how beneficial the service is to those users. Within social media platforms the users are not
just the consumers but are also the product; product for the advertising and
marketing firms that are looking to harvest user activities for information
that will allow them to better target advertisements. Internet companies, especially social media
companies are working feverishly to own the consumption chain, from eyeballs to
register. This requires having access to
enormous repositories of information on the personal details of its consumers
to be effective. This isn’t a malicious
objective per se, it’s a matter of efficiency as they see it. Objectively, if companies can discern
consumption preferences and boundaries the better they will be at marketing
products to consumers. In
consumption-based societies to consider this not a good thing seems a bit
psychotic. This of course requires some
deeper knowledge of the consumer’s habits, associations, etc. At a high level this is just inevitable efficiency
built into an evolving system. But an
environment is being created that encourages all of us to share, connect,
participate online and through this activity many benefits will be bestowed upon us. Unfortunately problems that arise from this level of
connectivity not just for individuals but also for organizations, for nations, are
significant. These problems are
significant enough, they create enough opportunity for malicious activity that some governance and monitoring seems required, like police patrolling the streets, shouldn’t laws
and governance adapt to patrol the digital streets of cyberspace to keep the
commons safe? If the answer is no then
why is it tolerable that police patrol our neighborhoods? If the answer is no then those that use the Internet should not have any sense of entitled security when they use the Internet. This said the opportunities for over reach are also significant. Access to this
data with the right set of tools can be extremely powerful for any organization
to use, and abuse.
This is by no means a simple conclusion. The issues are complex and after much
analysis I have determined are unresolvable.
Take one example, but one of the most controversial, the efforts of US
Intelligence agencies, who’s responsibilities are to monitor information
sources for intelligence on foreign threats.
Now there are long standing laws that stipulate their authorities stop
with domestic activities, which falls under the responsibility of the FBI and
now DHS and other domestic federal agencies.
Intelligence disciplines have been developed in signals intelligence,
imagery intelligence, emitter intelligence, etc to monitor foreign electronic emissions
for intelligence that help to defend US interests. The rise of the Internet and more
specifically social media globally for communications, even amongst groups the
US would consider foreign threats really complicate intelligence missions. After all, how do you tell the difference
between a US person and an Iranian person on Facebook? How can you discern whether or not the Anwar
al-Awlaki profile on Twitter belongs to the real person or is a fake? Maybe we should require 100% online accountability, then at least of a crime is committed it will be easier to identify the culprits. This of course has its own challenges as the Internet is not a geographically bounded technology and is used frequently by people around the world to communicate freely about civil rights and other social abuses by oppressive governments and other organizations. Blanket attribution would put many people at risk.
All of this activity is occurring on
services mostly operated by US commercial companies. It is well documented that organizations that
pose a threat to national security or US interests abroad use social media for
distributed communications and collaboration, even recruiting. But there isn’t a middle of the road
here. US Intelligence organizations
either develop capabilities and initiatives to monitor social media which
requires that they monitor all of it and then separate out data based on their
authorities on the back end, or they turn away from it which means the US will
have a growing blind spot in its ability to identify threat activity that falls
under their mission requirements. Now US
social media companies such as Facebook and Twitter with an international
consumer base are not going to police this themselves, nor will they just let
the US intelligence apparatus in, it would destroy their international
market. The US Telco and ISPs seem to be
the next likely point of entry to gain access to these communications as most
of them have a much more geographically defined client base. But there seems to be no rational public
dialogue about the activities of law enforcement or the US intelligence
agencies in these matters. The public
response seems only to be stay out, way out.
Yet at the same time, when disasters strike the first place people will
point to is the government. This seems
evident with the recent tragedy in Colorado where James Holmes was able to buy
significant amounts of weaponry and personal armor online to stage a lethal
assault against US citizens in a movie theater.
Comments seemed to come almost immediately questioning why he was able
to acquire so much ammo. Why was this
activity not flagged?
How do we have a rational dialogue about an issue that carries with it such negative connotations and visceral reactions. I am a skeptic, I don't think we will. I think this will continue to be a majorly divisive issue made more complicated by societies distrust and simultaneous reliance on its government for basic necessities.