What Stays in Vegas (39 page)

Read What Stays in Vegas Online

Authors: Adam Tanner

BOOK: What Stays in Vegas
4.22Mb size Format: txt, pdf, ePub

One of this book's narratives tells how thoughtful data analytics experts at Caesars ultimately decided, after many years, to start using outside data from brokers such as Acxiom. When Acxiom partially opened its dossiers to the public in late 2013, it revealed plenty of mistakes, some trivial and others significant. The initiative showed that data brokers and companies, for all of their insights about us, have not become all-knowing oracles. Just days before he left Acxiom as the marketing chief to become a managing director at JPMorgan Chase, Tim Suther spoke openly about the limitations of personal data. “It's like
searching for the fountain of youth,” he said. “You know that people are searching for that one bit of information that reliably predicts or describes people, and it just doesn't exist. You know we are all complex human beings with changing needs, changing context.”

When companies figure out a way for customers to reap real benefits from their own data, they will usher in a revolution in both marketing and self-empowerment. Consumers will increasingly take control of their own data. Some will routinely export medical and other personal records into their own managed vaults to keep better track of their lives and interface with the outside world.

Businesses should provide easy online access to download the personal data they hold about you. Such information might look like your credit card bill, with details of where and when you bought something, the amount, and category such as food/beverage or medical services. They should share a fair amount of detail: what exactly did you order at the restaurant, how many days was the car rental, how many miles did you drive? Perhaps you could set the fields of data you are interested in seeing. Some people would never bother to look up such details, but others would appreciate the easy access to such information.

Kanter, who in 2014 passed on the Caesars Total Rewards portfolio to a colleague as he focused on his new role as senior vice president of revenue acceleration, envisions Caesars sharing ever more data with customers. But he points out that eventually the raw data could overwhelm even the person whose actions generated the file. I saw this many years ago after reading about all the dull moments the Stasi notated about me in 1988, such as the several minutes I spent puzzling over a map trying to figure out where I was going.

Do Caesars customers really want a chart of how many days in advance they reserved their hotel rooms, how many minutes they sat in a restaurant on average, or even how many times they passed through the lobby (if future photo recognition technology could compute such comings and goings)? In some cases customers expect Caesars to record even more than they do, such as everything they ever uttered to a hotel clerk. Even with cheap and endless data storage, there can be information overload. “We have to show some judgment about what data is
meaningful to the end consumer,” Kanter said about the guidelines a company should embrace in releasing personal data. “Where does it enhance our relationship in creating value versus where does it create complexity that we don't have already?”

Recently, Internet giants have started allowing users to access their accumulated data. Twitter, for example, allows you to “request your archive,” everything from your first tweet and all resulting interactions. Facebook's account settings allow people to download their data. And in December 2013, Google announced it would allow users to obtain a copy of Gmail and calendar data, as well as from YouTube and other Google services.
19

Some companies will complain that sharing detailed customer information would prove onerous. But they already gather the information—they just need to design an interface that works for the average consumer. The point of empowering people with their own data is not to slow the mighty wheels of commerce. People will continue to buy. Businesses can still prosper while giving customers insight and choice. And if they are open about what they are doing, everyone can feel better about the whole process.

                  
ACKNOWLEDGMENTS

I owe thanks first of all to Harvard University Professor Latanya Sweeney. She invited me to spend the 2012–13 academic year in residence as a fellow in Harvard's Department of Government, and then invited me back as a 2013–14 fellow at the Institute for Quantitative Social Science (IQSS). Few people understand the power of big data and personal information better than Sweeney, one of the nation's top experts on data reidentification. Sweeney provided me with great insight, encouragement, and good humor throughout. Without her support I would not have been able to write this book.

My 2012–13 fellowship was supported in part by Harvard's Data Privacy Lab and a grant from the National Science Foundation. I am thankful to the chairman of the Department of Government, Timothy Colton, IQSS chairman Gary King, and the Nieman Foundation for Journalism, which first brought me to Harvard as a fellow for the 2011–12 academic year. During that year I began to study the topics covered in this book. I am indebted to curator Ann Marie Lipinski, who encouraged me to pursue this project, and former curator Bob Giles, who took me into the program.

Many graciously gave their time and assistance to make this book possible, including hundreds of people interviewed, only some of whom are included in the narrative. In particular, I want to thank the main subjects of the book. Gary Loveman graciously opened the doors of Caesars casinos, allowing me access to top executives, patrons, and internal workings. Joshua Kanter, the head of Caesars Total Rewards program, proved a patient host over many months during my visits to Las Vegas and other company casinos. He provided a deep level of frank insights into the operation of a major company. Rich Mirman
gave much help about the evolution of the company during his time there. Gary Thompson at Caesars also wholeheartedly supported the project.

The Monahan brothers spoke openly about their business and practices in a way still rare for the industry. Ann shared intimate details about her flirtation with Internet erotica and attempts to remain anonymous (I've left out her last name and Internet name at her request). Busted! founder Kyle Prall openly discussed his life and business in great detail, knowing he would face some tough questions. Janet LaBarba and Paola Roy generously shared intimate details about their arrest experiences. Claudia Perlich and her colleagues at Dstillery revealed the inner workings of online advertising to me. None of these participants made review of the material about them a precondition for their cooperation.

Shane Green and the team at
Personal.com
, Michael Fertik at
Reputation.com
, and Sarah Downey of Abine were generous with their time and knowledge. I gained insights from the Direct Marketing Association, which allowed me to join a two-day training session in New York to see what marketers are learning and to attend its annual conventions in Las Vegas and Chicago in 2012 and 2013, respectively. I thank Techonomy and its founder, David Kirkpatrick, for allowing me to attend its 2012 annual conference. I am thankful to former FBI agent Dennis Arnoldy for putting me in touch with Frank Cullotta, who lives under an assumed name in the witness protection program.

Many professors, students, fellows, and others at Harvard University shared their insights and suggestions with me, including Henry Louis Gates Jr., Laurence Tribe, David Moss, Harry Lewis, Jonathan Zittrain, Martha Minow, Mikolaj Jan Piskorski, Max Bazerman, Yochai Benkler, Phil Malone, Kit Walsh, Sean Hooley, and Charles Nesson. John Deighton of Harvard Business School gave useful comments on the advertising chapter and made valuable suggestions. Sunil Gupta, also at HBS, graciously allowed me to sit in on his online marketing class in the spring of 2012. Jim Waldo, Harvard's chief technology officer, helped guide me on the path to this book by letting me sit in on his excellent class “Privacy and Technology,” which he coteaches with
Latanya Sweeney, during my Nieman fellowship year. I am grateful to others at the university whose teachings inspired me in other fields. These include my jazz gurus Daniel Henderson, Vijay Iyer, and Ingrid Monson and language gurus Richard Delacy and Giuliana Minghelli.

Writers Paige Williams, Neal Gabler, Ron Suskind, Nazila Fathi, and Gay Talese offered inspiration, as did my long-ago professor at Princeton, John McPhee. Liza Boyd gave me tremendously valuable suggestions on improving the structure of the book, and her many improvements are reflected in these pages. Dina Kraft, Sam Loewenberg, George Nikides, David Kim, and Patrick Hoge all offered insightful editing on some of the chapters. My agent, Alice Martell, sharpened the focus of the work with infectious enthusiasm. Clive Priddle at PublicAffairs Books made this book immeasurably better with his suggestions and edits and always embodied the image of the gentleman publisher. My family supported me wholeheartedly throughout the immersive and all-consuming focus a book inevitably demands, and listened to endless dinnertime stories about personal data as I discovered new insights.

Despite all this help and my best efforts, there may be matters I did not describe as precisely as I set out to, and I apologize in advance for any errors that may have slipped by. I'd enjoy hearing from readers, and can be reached at
[email protected]
.

Copyright © 2014 Robert Leighton

               
APPENDIX

               
Take Control of Your Data

How to Control Your Data Flow

People have highly personal attitudes toward their own data. Some are alarmed by the privacy risks of the increasing amount of data collection; others scoff and ask why people make such a big fuss.

By telling the stories of how firms gather data and use them, I hope that readers will get a sense of what they are comfortable sharing. Some people are happy to receive targeted advertising online and off, and are comfortable letting firms gather data about them. Others may try to avoid such tracking. Or they may be comfortable sharing in some spheres but not others. At a Personal Genome Project conference, several volunteers told me they openly share their DNA and medical histories for science to study but refuse to maintain Facebook accounts because they do not want to transmit everything about their lives. In the end, it's up to you to control how much data you shed.

As with healthy eating, no one magic ingredient protects against the proliferation of personal data. Just adding oatmeal will not make a substantial health difference. You have to embrace a wide variety of foods and practices to change the health impact of what you eat. The same goes with gaining more control of personal data. Some cost or inconvenience comes with seeking to stem the flow of personal data.

Other analogies apply. “It's like a disease where there is no single drug that can heal it but there is a cocktail of drugs that would,” says Vitaly Shmatikov, who specializes in privacy issues at the University of Texas. “It is sort of unpleasant because you would like to solve the problem once and for all.”

Many Internet users may find the whole issue of seeking to protect their personal data tiresome. “I am a typical consumer of the baby boom generation and a busy person. I do shop online and I want to take advantage of the convenience and wider array of choices that the Internet offers,” says Susan Grant, director of consumer protection at the Consumer Federation of America. “Other than following the basic safety rules . . . I don't take any special precautions or use any special programs. And I don't generally read privacy policies. That's why I want things like ‘do not track' on by default, and nutrition-label-style privacy notices. Make it simple for me, please!”

On the other end of the spectrum, consider Eben Moglen, a professor at Columbia Law School and founding director of the Software Freedom Law Center. He maintains his own web server and an old-style cell phone (i.e., not a smart phone). When surfing the Internet, he encrypts his communications (via SSH), obscures monitoring of his web searches through a plug-in called TrackMeNot, uses additional privacy protection plug-ins including Adblock Plus and NoScript, and a text-based web browser like w3m or Surfraw. He avoids Google Voice and Skype and instead uses a system based on Asterisk. But he worked for a time as a programmer at IBM, so he has a special level of expertise to implement all these tools.

Alessandro Acquisti, an associate professor at Carnegie Mellon University, has done interesting work related to photo-recognition technology and Social Security numbers. He uses some privacy-enhancing tools, such as programs that increase online anonymity, but in moderation. “I do not use all those tools all the time,” he says. “After a certain point, the marginal costs (as well as the opportunity costs) of trying to ‘protect' more and more of your personal information increase rapidly, while the effectiveness of those protective strategies equally rapidly decreases.”

Other books

Space Hostages by Sophia McDougall
A Commodore of Errors by John Jacobson
Barefoot Girls by McTiernan, Tara
Mirabile by Janet Kagan
Murder Carries a Torch by Anne George
Origins: The Reich by Mark Henrikson
CARLOTA FAINBERG by Antonio Muñoz Molina
Trusting Calvin by Sharon Peters
The Secret History by Donna Tartt