recommended reading

Americans Gave Away Online Privacy to Advertisers Long Ago

Ronda Churchill/AP file photo

New stories surface every day detailing the National Security Agency’s administration of secret programs designed to keep the US “safe” in an era of internet communication and global networks. Having a strong opinion on any particular set of details would be premature.

But allow me to offer this: Whatever abuses of privacy occurred, we remain entirely responsible for our reaction to them and the subsequent action taken by lawmakers. So far, in general Americans have been apathetic—the New York Times described the reaction as “a collective national shrug.” While sales of 1984 have spiked in the wake of the NSA reveal, Americans have basically told our leadership that the monitoring of personal communications is A-OK. If we look for a genesis of this unbelievable attitude, I believe we must look closely at the tech industry’s addiction to revenue models that cost end-users nothing except their privacy.

The conundrum of privacy in a digital era is that the more of it you give away, the better the service you’re using becomes. Facebook mines your friends and preferences to make your Newsfeed as interesting as possible. Foursquare analyzes your check-in data in order to give you recommendations when you visit new cities. Twitter routinely recommends new and interesting accounts based off of who I already follow, as do scores of other services—network effects are, after all, what makes these websites so useful in the first place.

Read more at Quartz.

Threatwatch Alert

Network intrusion / Spear-phishing

Researchers: Bank-Targeting Malware Sales Rise in Dark Web Markets

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.