Technocreep (12 page)

Read Technocreep Online

Authors: Thomas P. Keenan

BOOK: Technocreep
6.89Mb size Format: txt, pdf, ePub

There are more creepy U.S. patents such as #8,350,708 (Nike) which will allow your clothing to tell a treadmill that you're authorized to use it, and #7,925,549 (Accenture Global Services) which envisions “personalized advertising messages” routed to you based on, among other things, the RFID chips you happen to be carrying.

Perhaps the strangest place to find an RFID chip is inside medical products such as silicone breast implants. The Florida-based company Establishment Laboratories has introduced Motiva Implant Matrix Ergonomix which will allow suitably equipped doctors to read the name, rank, and serial number of the breast implants, in vivo.
143

RFID technology gets even more invasive, and creepy, when combined with video cameras and sensors. Using these technologies, merchants can sort customers into gender and approximate age group, and track what they have picked up and put down. A Saint Petersburg, Russia-based company called Synqera even offers facial recognition and mood detection capabilities on its in-store terminals.

Intriguingly, one of the companies interested in working with stores to develop “customer tracking solutions” is Omnilink Systems, Inc. If you are a law-abiding citizen, you have probably never heard of them, nor their flagship OM 400 product, a bulky ankle bracelet. It is used to monitor criminals under house arrest and track those accused of crime who are out in the community. It even features a “mobile exclusion zone feature” where “you can not only track the whereabouts of convicted gang offenders individually, but also track the intersection of gang members restricted from association.”
144

A flurry of news stories in 2005 suggested that there would soon be a big market for RFID tagged baby clothing.
145
However, the idea never caught on, and has been basically superseded by the ability to track people with smartphones apps such as Life360. Not only will that one alert you to their whereabouts, it will even provide a warning when your children are approaching a known crime scene.

Technology has outstripped human bodies in countless ways. Cars move us faster than we can possibly run. Computers do complex arithmetic computations fast and flawlessly. IBM's Deep Blue defeats world chess champion Gary Kasparov who, in a typically human reaction, accuses it of cheating.

Vernor Vinge, Raymond Kurzweil, and other thinkers tell us that we are rapidly approaching “The Singularity,” a point in time at which artificial intelligence will surpass human brainpower in important ways.

It is not obvious that we will even know when the machines have outstripped us. We also have no idea how they will treat us. Some science fiction writers predict that humans will be treated as a virus to be eradicated; others suggest that we will make excellent pets for our digital masters.

Most of us have already reached a kind of personal “privacy singularity.” In some very important ways, our technologies, taken together, know more about us than our most significant human friend or lover. This is totally understandable, since we spend so much time exchanging information through technology. They are our electronic confidants, our faithful servants, and in some cases, two-timing spies.

Every time you “Look Inside” a book, “Like” a Facebook post, “Friend” someone new, send an email, or log on from a different place, you are leaving a digital trail that is being scrutinized to learn more about you. Techniques with exotic names like predictive analytics, k-means clustering, and cross-platform tracking provide deep insights into our thoughts and behavior. While human relationships may come and go, your online presence is forever.

For instance, let us compare the world of online shopping with going to a brick-and-mortar store. If you shop on a site like Amazon, you will undoubtedly be reminded about items that you looked at but did not purchase.

That's fair game. After all, a good salesperson in an upscale ­clothing store would also remember you and show you that tie you passed on last week, as well as others like it. The salesclerk would let you in on special sales and perhaps offer you some sort of incentive to buy it. So does Amazon. So far, the Internet is just mimicking real world commerce.

But what if that store clerk compared notes with the other retailers in a shopping mall to build a detailed dossier on you? What if conversations you had while walking between stores were mined for intelligence about your buying habits? A growing network of data partnerships is making this kind of snooping the norm in the online world. You probably agreed to it when you clicked on some Terms and Conditions that you did not really read.

As one blogger reported, “an image of some headphones I looked at (on) an e-commerce site ended up staring back at me from an ad on Facebook later that day.”
146
Dave Obasanjo goes on to explain that was made possible by a system called Facebook Exchange (FBX). This is a real-time bidding platform where companies, like headphone maker SkullCandy, purchase access to your eyeballs through sponsored ads on Facebook.

Google's Gmail serves up ads targeted to your interests, which it can determine by having programs scan the content of your emails for certain keywords. Google notes that you gave them permission to do this when you signed up for Gmail. But what if a non-Gmail user sends an email to somebody on Gmail? The sender never agreed to those terms of service. A lawsuit against Google suggested this was a form of wiretapping. In reply, the company's lawyers asserted that they have that right to scan those emails anyway.

Google's Motion to Dismiss stated that “Just as a sender of a letter to a business colleague cannot be surprised that the recipient's assistant opens the letter, people who use web-based email today cannot be surprised if their communications are processed by the recipient's ECS provider in the course of delivery.”
147

Still, this does feel like a human salesperson trading on private conversations you had in the hall, or digging through your garbage. Even if the judges rule that the law is on Google's side here, that may just mean that the laws do not reflect our common sense understanding of what privacy is and how it should be protected.

The other major force in automating the online sales process is to use every scrap of information about your friends and their likes and dislikes. Amazon now alerts you if any of your Facebook connections have written reviews of products you are looking at. They also show you what “Customers Who Bought Items in Your Recent History Also Bought.”

This is their “item-to-item collaborative filtering” algorithm at work. It attempts to figure out what you would like to buy based on the behavior of other people who are somehow like you. The success of this technique depends on having a good way to define “people like me” and a large and rich data source upon which to base recommendations. According to its April 13, 2012 Privacy Policy, Amazon collects the following automatically from each web visitor: “The Internet protocol (IP) address used to connect your computer to the Internet; login; e-mail address; password; computer and connection information such as browser type, version, and time zone setting, browser plug-in types and versions, operating system, and platform; purchase history, which we sometimes aggregate with similar information from other customers to create features like Top Sellers;  the full Uniform Resource Locator (URL) clickstream to, through, and from our Web site, including date and time; cookie number; products you viewed or searched for; and the phone number you used to call our 800 number.”

Amazon also collects your “length of visits to certain pages” which does have a certain “looking over my shoulder” feel to it. Then there is all the information you provided voluntarily. Did you write a review of a product? Put something on a Wish List? Ask to be reminded of a special occasion? It's all in your personal file at Amazon. The divergence from the friendly necktie salesman becomes even greater when you realize that this file is for keeps (unless you change your email address and even then you might be linked by IP address or credit card).

The computers at Amazon and Google usually have no reason to forget or purge any data, and every reason to hang onto it in perpetuity, a license you explicitly granted them when you agreed to their terms and conditions. You also agreed to have your data shared, sold, aggregated with the data of others, and sold again.

The power of social data is illustrated by the fact that some hotel chains employ full-time social media specialists to help manage their online reputations, and to respond to negative reviews on sites like Tripadvisor with comments like “yes we had some bed bugs but we've changed all the mattresses.”

I use an itinerary management site called Worldmate, and always steer clear of the “Share with your friends on Facebook” button. I don't necessarily want a bunch of people I barely know having my detailed itinerary.

Over at Google-owned YouTube, it has been reported by insiders that “recommendations account for about 60% of all video clicks from the home page.”
148
The Google employees who wrote this paper also note that “many of the interesting videos on YouTube have a short life cycle going from upload to viral in the order of days requiring constant freshness of recommendation.”

If you want to see how much data is being collected on you, and how you are being tracked, just install a free application call Ghostery. It discloses, for example, that even the staid Government of Canada website is feeding information to Google Analytics, in return for what they get back—information on visitors to their web pages. And
www.cnn.com
is positively bleeding information about you all over the place. Accessed from New York City, Ghostery reported forty-three trackers on that site, some with revealing names like Visual Revenue and Facebook Beacon, but also some cryptic ones like Moat and Rocket Fuel.

The documentary film
Terms and Conditions May Apply
includes an estimate of the annual value of the data you give up to Google by using their “free” services. How the film's producers came up with the number $500 is as shrouded in mystery as the internal workings of Google, but there is little doubt that we are becoming more valuable every year as advertisers move from the traditional “show it to everybody and hope someone buys” model to highly targeted ads.

An astounding number of the creepiest technologies come from Japan, where they are accepted with a remarkable
sangfroid
, or perhaps just naughty delight. This is, after all, the country that had to invoke its “Antique Dealings Law” in 1993 to curb the sale of used schoolgirl panties in automated machines.
149
Cognoscenti say you can still find those machines in rural Japan, and pictures of them are preserved for posterity in YouTube videos.
150
Then again, with e-commerce sites like
myusedpantystore.com
, why would anyone even bother looking for a vending machine?

What could be technocreepier than buying schoolgirl panties from a vending machine on the way to work? Perhaps, having your boss catch you sniffing them in your cubicle.

Tokyo-based KDDI Corporation has crafted an exquisitely creepy piece of software that might allow just that. It uses an employee's smartphones to figure out what the person is doing on company time, on a second-by-second basis. According to Addy Dugdale's piece in
Fast Company
, the “software is embedded into an employee's mobile that is connected to a server that analyzes their movements via the phone's accelerometer. At first, workers will have to input just what action they are performing into their mobiles so that their movements can be interpreted. The system becomes more accurate as time goes on, recognizing each individual's movements.”
151
Employers do have many legal rights with respect to pieces of technology they supply to employees, but checking how your phone is jiggling or not jiggling certainly borders on the totalitarian.

I knew an engineer who could cobble together just about anything electrical or electronic. His front lawn had an elaborate system of sensors to detect intruders. “I didn't want to hit them with missiles or lasers or anything,” he told me, “so if somebody stepped on my lawn the sprinkler in that zone would turn on. They knew that I knew they were there, and that was enough.”

He also figured out how to detect, based on body size, which family member had just entered a room. Not only did his contraption flick on the lights, it turned on the TV, thoughtfully tuning it to the person's favorite channel.

“Get rid of that or I'm getting a divorce,” his wife told him. “It creeps me out.”

In a similar fashion, bars such as the Beantown Pub in Boston have been equipped with a suite of cameras that do “facial ­detection.”
152
The goal is not to figure out who you are, but to ­figure out how busy the place is, as well as the ratio of males to females currently in the establishment and their approximate ages. It would be a small step to add a deeper analysis of physical ­characteristics, and undoubtedly some entrepreneur is working on just such a system.

Passwords, with all their shortcomings, do a reasonable job of protecting our workplace systems and even let us do online shopping and banking. But if Motorola's Research Division (now owned by Google) has its way, you may take a “password pill” every day. Designed to pass through your digestive system, it will emit radio waves and relieve of us of the chore of generating and remembering good passwords, as well as the guilt if we use “123456” or “snoopy.”

The pill has been hailed as a great solution to the proliferation of passwords and damned as a frivolous invasion of your body. Made by Proteus Digital Health of Redwood City, CA, the digestible chip might find application in prisons and nursing homes, but it is hard to imagine a free citizen wanting to pop one of these with their daily vitamins. Aside from the unsavory feeling of having a foreign object broadcasting from inside your tummy, this concept might reduce stealing your access credentials to the simple act of grabbing one of your pills.

Other books

The Piano Tuner by Daniel Mason
Sorcerer by Menon, David
Shadow Warrior by Randall B. Woods
Bull's Eye by Sarah N. Harvey
An Anonymous Girl by Greer Hendricks and Sarah Pekkanen
Caught in the Light by Robert Goddard
The Crow Trap by Ann Cleeves