SlideShare a Scribd company logo
1 of 4
Download to read offline
T
First Principles
Big Tech, Privacy, and Power
The power of Big Tech has been growing slowly, and in a way that many of
us have accommodated as a necessary infiltration. But the scope of that
power—and its costs to the culture we have ordered—have been less
transparent.
he ground is shifting quickly beneath our feet when it comes to tech, privacy, and
power. And, although tech companies, their advocates, and even some policymakers,
would like us to imagine these issues are cut and dried, they are not.
In their book The Sovereign Individual [https://www.amazon.com/Sovereign-Individual-Mastering-
Transition-Information/dp/0684832720] , published on the eve of the year 2000, James Dale
Davidson and William Rees-Mogg attempt to grapple with the forthcoming technological changes
By Rachel Bovard • April 25, 2020
That a private company can now unilaterally decide to simply delete the
promotion of protests it deems unacceptable is a remarkable expansion of its
power over what was once a sacrosanct and constitutionally protected
that the new millennium inevitably would bring. “As technology revolutionizes the tools we use,” they
wrote, “it also antiquates our laws, reshapes our morals, and alters our perceptions.”
This is the dynamic that has been unfolding slowly over the last 20 years, as Google, Facebook,
Twitter, and other social media platforms have transformed how we engage with communications,
culture, commerce, and one another.
But the COVID-19 pandemic has pushed that transformation into overdrive, while exposing just how
significantly power dynamics—between individuals and corporations, and individuals and the state—
have shifted.
Earlier this week, Facebook announced it was removing posts intended to organize rallies protesting
government stay-at-home policies in various states. Initially, a Facebook spokesman claimed the
company was doing this at the behest of state governments. Nearly 12 hours later, the company
clarified [https://thefederalist.com/2020/04/21/facebook-isnt-actually-colluding-with-state-
governments-but-its-still-removing-protest-posts/] it was independently removing posts “when
gathering[s] do not follow the health parameters established by the government.”
Facebook did not clarify if this meant gatherings in violation of state laws, or executive orders with no
force of law, or merely violations of government suggested practices.
This opens up a new, concerning lane for Facebook, and for tech more broadly. As Big Tech cements
itself as our primary facilitator of communication (as it most certainly has during this pandemic), it
wields outsized power.
Kalev Leetaru at George Washington University recently pointed out
[https://www.realclearpolitics.com/articles/2020/04/22/facebooks_covid-
protest_ban_renews_censorship_concerns_143003.html] the significance of this shift, and the lines
that blur as a result:
freedom. As we cede the public square to private companies, however, those
constitutional freedoms of speech and expression no longer apply in some
cases. Through those private companies, in fact, government officials can in
effect restrict speech they are obligated to protect.
The irony is that less than a year ago, Mark Zuckerberg gave a speech
[https://www.washingtonpost.com/technology/2019/10/17/zuckerberg-standing-voice-free-
expression/] at Georgetown University where he extolled tech’s many virtues, including how tech
platforms “have decentralized power by putting it directly into people’s hands.” Yet Facebook’s most
recent actions confirm that power of communication for the 70 percent
[https://www.pewresearch.org/internet/fact-sheet/social-media/] of American adults who use
Facebook, rather than being made disparate, is still very much centralized in the tech platform.
YouTube has also put itself in the position of defining “correct” speech—but this time, by aligning itself
with the World Health Organization. YouTube’s CEO announced
[https://www.dailywire.com/news/watch-youtube-ceo-well-remove-any-content-that-goes-against-
who-recommendations] that the platform would remove “anything that would go against World
Health Organization (WHO) recommendations.”
YouTube’s apparent motivation is to keep people safe from misinformation—which makes their choice
of WHO recommendations an interesting one. In mid-January, the organization was telling the world
that COVID-19 wasn’t contagious. WHO also publicly opposed
[https://www.technologyreview.com/2020/01/30/275959/the-china-coronavirus-is-officially-an-
international-emergency/] the travel restrictions put in place by multiple countries and didn’t declare
coronavirus a pandemic until March 11. All along [https://amgreatness.com/2020/04/18/who-are-
you-a-pattern-of-deceit-at-the-world-health-organization/] , the organization has taken China’s
obviously false claims at face value, allowing the virus to spread.
Yet this is the banner behind which YouTube will fly its “user safety” flag, thus imposing WHO’s views
on its massive user base [https://www.pewresearch.org/internet/fact-sheet/social-media/] .
Tracking You—For Your Health.
Then there is the thorny notion of contact tracing—the way in which public health experts attempt to
contain a viral pathogen by tracing where an infected individual has been, and with whom they’ve
been in contact. Traditionally, contact tracing has been analog, based on a conversation between
patient and doctor.
But the digital age has exploded contact tracing exponentially. It is much more efficient and accurate to
trace a virtual trail, particularly as we leave immense digital footprints wherever we go. South Korea
has typified this type of response, tracking [https://www.smartcitiesworld.net/news/news/south-
korea-to-step-up-online-coronavirus-tracking-5109] COVID-19 patients using credit card data,
surveillance camera footage, and cell phone location data. The South Korean government recently
announced [https://en.yna.co.kr/view/AEN20200411000500320] they’d be requiring infected
individuals to wear electronic wristbands to ensure patients did not breach quarantine.
It is unlikely U.S. citizens would tolerate such intense and mandatory surveillance measures. But that’s
where Big Tech comes in.
Without being asked, Google already has been sharing aggregate user location data with governments
interested in compliance with social distancing measures. The House Freedom Caucus, a group of
conservatives, sent a letter [https://twitter.com/freedomcaucus/status/1248677702875439107?s=20]
to Google raising concern over the “frightfully detailed, specific, and granular” data being provided to
government officials.
Google and Apple recently have announced the development of a contact tracing technology that will
use cell phone Bluetooth proximity data to alert individuals if they have come into contact with an
infected person. The app’s effectiveness depends upon people self-reporting their own positive
diagnosis. Already, security experts have raised concerns [https://themarkup.org/ask-the-
markup/2020/04/14/will-googles-and-apples-covid-tracking-plan-protect-privacy] about false
positives, spoofing, re-anonymization, and “proximity marketing” (yes, you’re just trying to avoid
getting sick, but tech advertisers could still make money). Experts [https://www.protocol.com/oped-
john-ackerly-surveillance-coronavirus] have also pointed out how easy it would be for this system to
be abused [https://www.marketwatch.com/story/this-could-be-abused-privacy-experts-take-
cautious-approach-to-apple-and-googles-coronavirus-contact-tracing-technology-2020-04-16] .

More Related Content

What's hot

Web 2.0 and a Changing World
Web 2.0 and a Changing WorldWeb 2.0 and a Changing World
Web 2.0 and a Changing WorldMichael Coghlan
 
Privacy, prosumer law & competition workshop, 2 June EDPS
Privacy, prosumer law & competition workshop, 2 June EDPSPrivacy, prosumer law & competition workshop, 2 June EDPS
Privacy, prosumer law & competition workshop, 2 June EDPSChris Marsden
 
Swissgov presentation 23rd September 2010
Swissgov presentation 23rd September 2010Swissgov presentation 23rd September 2010
Swissgov presentation 23rd September 2010osimod
 
Mobile & Journalism - USC Annenberg Mobile News Week
Mobile & Journalism - USC Annenberg Mobile News WeekMobile & Journalism - USC Annenberg Mobile News Week
Mobile & Journalism - USC Annenberg Mobile News WeekTHE SWARM
 
Social Networking Effect on Society
Social Networking Effect on SocietySocial Networking Effect on Society
Social Networking Effect on SocietyJustine R. Jones
 
Pria Webinar Jan08
Pria Webinar Jan08Pria Webinar Jan08
Pria Webinar Jan08guest1d0cef
 
Gov 2.0 from the inside out: supercharging the public sector with social media
Gov 2.0 from the inside out: supercharging the public sector with social mediaGov 2.0 from the inside out: supercharging the public sector with social media
Gov 2.0 from the inside out: supercharging the public sector with social mediaPatrick McCormick
 
The Future of Media
The Future of MediaThe Future of Media
The Future of MediaKat Tancock
 
Reinventing Journalism: Trends, Innovations and Unanswered Questions
Reinventing Journalism: Trends, Innovations and Unanswered QuestionsReinventing Journalism: Trends, Innovations and Unanswered Questions
Reinventing Journalism: Trends, Innovations and Unanswered QuestionsDamian Radcliffe
 
Lis presentation.mov
Lis presentation.movLis presentation.mov
Lis presentation.movDan Blanchard
 
Journalists And Social Media June 10, 2009
Journalists And Social Media June 10, 2009Journalists And Social Media June 10, 2009
Journalists And Social Media June 10, 2009nancyshute
 
Week 6: Open data
Week 6: Open dataWeek 6: Open data
Week 6: Open dataGreg Wass
 
Data journalism: are you a unicorn or a racehorse?
Data journalism: are you a unicorn or a racehorse?Data journalism: are you a unicorn or a racehorse?
Data journalism: are you a unicorn or a racehorse?Paul Bradshaw
 
Web 2.0 Licensed to Kill
Web 2.0 Licensed to KillWeb 2.0 Licensed to Kill
Web 2.0 Licensed to KillMike Thornburg
 
Social media paper
Social media paperSocial media paper
Social media paperFrank Smilda
 

What's hot (20)

Web 2.0 and a Changing World
Web 2.0 and a Changing WorldWeb 2.0 and a Changing World
Web 2.0 and a Changing World
 
Privacy, prosumer law & competition workshop, 2 June EDPS
Privacy, prosumer law & competition workshop, 2 June EDPSPrivacy, prosumer law & competition workshop, 2 June EDPS
Privacy, prosumer law & competition workshop, 2 June EDPS
 
Swissgov presentation 23rd September 2010
Swissgov presentation 23rd September 2010Swissgov presentation 23rd September 2010
Swissgov presentation 23rd September 2010
 
Mobile & Journalism - USC Annenberg Mobile News Week
Mobile & Journalism - USC Annenberg Mobile News WeekMobile & Journalism - USC Annenberg Mobile News Week
Mobile & Journalism - USC Annenberg Mobile News Week
 
Web Squared
Web SquaredWeb Squared
Web Squared
 
Social Networking Effect on Society
Social Networking Effect on SocietySocial Networking Effect on Society
Social Networking Effect on Society
 
Pria Webinar Jan08
Pria Webinar Jan08Pria Webinar Jan08
Pria Webinar Jan08
 
Gov 2.0 from the inside out: supercharging the public sector with social media
Gov 2.0 from the inside out: supercharging the public sector with social mediaGov 2.0 from the inside out: supercharging the public sector with social media
Gov 2.0 from the inside out: supercharging the public sector with social media
 
How Media Consumption Has Changed Since 2000
How Media Consumption Has Changed Since 2000How Media Consumption Has Changed Since 2000
How Media Consumption Has Changed Since 2000
 
The Future of Media
The Future of MediaThe Future of Media
The Future of Media
 
Reinventing Journalism: Trends, Innovations and Unanswered Questions
Reinventing Journalism: Trends, Innovations and Unanswered QuestionsReinventing Journalism: Trends, Innovations and Unanswered Questions
Reinventing Journalism: Trends, Innovations and Unanswered Questions
 
Lis presentation.mov
Lis presentation.movLis presentation.mov
Lis presentation.mov
 
Journalists And Social Media June 10, 2009
Journalists And Social Media June 10, 2009Journalists And Social Media June 10, 2009
Journalists And Social Media June 10, 2009
 
Week 6: Open data
Week 6: Open dataWeek 6: Open data
Week 6: Open data
 
Data journalism: are you a unicorn or a racehorse?
Data journalism: are you a unicorn or a racehorse?Data journalism: are you a unicorn or a racehorse?
Data journalism: are you a unicorn or a racehorse?
 
Changing digital landscape
Changing digital landscapeChanging digital landscape
Changing digital landscape
 
Heegppt
HeegpptHeegppt
Heegppt
 
How Young Adults Get News and Information About Their Local Communities
How Young Adults Get News and Information About Their Local CommunitiesHow Young Adults Get News and Information About Their Local Communities
How Young Adults Get News and Information About Their Local Communities
 
Web 2.0 Licensed to Kill
Web 2.0 Licensed to KillWeb 2.0 Licensed to Kill
Web 2.0 Licensed to Kill
 
Social media paper
Social media paperSocial media paper
Social media paper
 

Similar to Big Tech, Privacy, and Power

Social Media: The Power to Make an Impact
Social Media: The Power to Make an ImpactSocial Media: The Power to Make an Impact
Social Media: The Power to Make an ImpactJohn Smith
 
The promise and peril of big data
The promise and peril of big dataThe promise and peril of big data
The promise and peril of big datarmvvr143
 
Social Media- A gateway to world domination
Social Media- A gateway to world dominationSocial Media- A gateway to world domination
Social Media- A gateway to world dominationKrishna Vijaywargiy
 
Digital diplomacy - the internet and the battle for ideas
Digital diplomacy - the internet and the battle for ideasDigital diplomacy - the internet and the battle for ideas
Digital diplomacy - the internet and the battle for ideasnelliesk
 
080924 Mexican Tourist Board Crisis Communications
080924   Mexican Tourist Board   Crisis Communications080924   Mexican Tourist Board   Crisis Communications
080924 Mexican Tourist Board Crisis CommunicationsGed Carroll
 
The virtual team 1
The virtual team 1The virtual team 1
The virtual team 1Clara Song
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...Ulf Mattsson
 
Disaster Strikes. Social Media Responds. Helpful Resources
Disaster Strikes. Social Media Responds. Helpful ResourcesDisaster Strikes. Social Media Responds. Helpful Resources
Disaster Strikes. Social Media Responds. Helpful ResourcesArielle Slam
 
3 ways to engage citizens using social media
3 ways to engage citizens using social media3 ways to engage citizens using social media
3 ways to engage citizens using social mediaGohar Khan
 
3 ways to engage citizens using social media
3 ways to engage citizens using social media3 ways to engage citizens using social media
3 ways to engage citizens using social mediaGohar Feroz Khan
 
TECHNOLOGY AND ITS IMPACT ON CONSUMER BEHAVIOR.pptx
TECHNOLOGY AND ITS IMPACT ON CONSUMER BEHAVIOR.pptxTECHNOLOGY AND ITS IMPACT ON CONSUMER BEHAVIOR.pptx
TECHNOLOGY AND ITS IMPACT ON CONSUMER BEHAVIOR.pptxkaterinfz
 
8Dangers of Social MediaThe world has been evolving in a v.docx
8Dangers of Social MediaThe world has been evolving in a v.docx8Dangers of Social MediaThe world has been evolving in a v.docx
8Dangers of Social MediaThe world has been evolving in a v.docxsodhi3
 
8Dangers of Social MediaThe world has been evolving in a v.docx
8Dangers of Social MediaThe world has been evolving in a v.docx8Dangers of Social MediaThe world has been evolving in a v.docx
8Dangers of Social MediaThe world has been evolving in a v.docxblondellchancy
 
The impact of false information spread.p
The impact of false information spread.pThe impact of false information spread.p
The impact of false information spread.pmaryams2156
 
Impact of the globalization of social media(advantages and disadvantages)
Impact of the globalization of social media(advantages and disadvantages)Impact of the globalization of social media(advantages and disadvantages)
Impact of the globalization of social media(advantages and disadvantages)ZeeshanMajeed15
 

Similar to Big Tech, Privacy, and Power (20)

Social Media: The Power to Make an Impact
Social Media: The Power to Make an ImpactSocial Media: The Power to Make an Impact
Social Media: The Power to Make an Impact
 
Is data privacy a reality with the gdpr?
Is data privacy a reality with the gdpr?Is data privacy a reality with the gdpr?
Is data privacy a reality with the gdpr?
 
The promise and peril of big data
The promise and peril of big dataThe promise and peril of big data
The promise and peril of big data
 
Twitter inc in 2018
Twitter inc in 2018Twitter inc in 2018
Twitter inc in 2018
 
Social Media- A gateway to world domination
Social Media- A gateway to world dominationSocial Media- A gateway to world domination
Social Media- A gateway to world domination
 
Digital diplomacy - the internet and the battle for ideas
Digital diplomacy - the internet and the battle for ideasDigital diplomacy - the internet and the battle for ideas
Digital diplomacy - the internet and the battle for ideas
 
080924 Mexican Tourist Board Crisis Communications
080924   Mexican Tourist Board   Crisis Communications080924   Mexican Tourist Board   Crisis Communications
080924 Mexican Tourist Board Crisis Communications
 
Order 32740459
Order 32740459Order 32740459
Order 32740459
 
The virtual team 1
The virtual team 1The virtual team 1
The virtual team 1
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...
 
Disaster Strikes. Social Media Responds. Helpful Resources
Disaster Strikes. Social Media Responds. Helpful ResourcesDisaster Strikes. Social Media Responds. Helpful Resources
Disaster Strikes. Social Media Responds. Helpful Resources
 
3 ways to engage citizens using social media
3 ways to engage citizens using social media3 ways to engage citizens using social media
3 ways to engage citizens using social media
 
3 ways to engage citizens using social media
3 ways to engage citizens using social media3 ways to engage citizens using social media
3 ways to engage citizens using social media
 
THE GREAT HACK.docx
THE GREAT HACK.docxTHE GREAT HACK.docx
THE GREAT HACK.docx
 
TECHNOLOGY AND ITS IMPACT ON CONSUMER BEHAVIOR.pptx
TECHNOLOGY AND ITS IMPACT ON CONSUMER BEHAVIOR.pptxTECHNOLOGY AND ITS IMPACT ON CONSUMER BEHAVIOR.pptx
TECHNOLOGY AND ITS IMPACT ON CONSUMER BEHAVIOR.pptx
 
E era ir-us-fp
E era ir-us-fpE era ir-us-fp
E era ir-us-fp
 
8Dangers of Social MediaThe world has been evolving in a v.docx
8Dangers of Social MediaThe world has been evolving in a v.docx8Dangers of Social MediaThe world has been evolving in a v.docx
8Dangers of Social MediaThe world has been evolving in a v.docx
 
8Dangers of Social MediaThe world has been evolving in a v.docx
8Dangers of Social MediaThe world has been evolving in a v.docx8Dangers of Social MediaThe world has been evolving in a v.docx
8Dangers of Social MediaThe world has been evolving in a v.docx
 
The impact of false information spread.p
The impact of false information spread.pThe impact of false information spread.p
The impact of false information spread.p
 
Impact of the globalization of social media(advantages and disadvantages)
Impact of the globalization of social media(advantages and disadvantages)Impact of the globalization of social media(advantages and disadvantages)
Impact of the globalization of social media(advantages and disadvantages)
 

More from Dharmendra Rama

The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowDharmendra Rama
 
Adding Incident Response Containers To The Cyber Security Tool Belt
Adding Incident Response Containers To The Cyber Security Tool BeltAdding Incident Response Containers To The Cyber Security Tool Belt
Adding Incident Response Containers To The Cyber Security Tool BeltDharmendra Rama
 
CORSAIR VENGEANCE A4100 GAMING PC REVIEW
CORSAIR VENGEANCE A4100 GAMING PC REVIEWCORSAIR VENGEANCE A4100 GAMING PC REVIEW
CORSAIR VENGEANCE A4100 GAMING PC REVIEWDharmendra Rama
 
MINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMES
MINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMESMINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMES
MINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMESDharmendra Rama
 
How to build a gaming PC — and why you should
How to build a gaming PC — and why you shouldHow to build a gaming PC — and why you should
How to build a gaming PC — and why you shouldDharmendra Rama
 
How to Build a Gaming PC for Under $1200
How to Build a Gaming PC for Under $1200How to Build a Gaming PC for Under $1200
How to Build a Gaming PC for Under $1200Dharmendra Rama
 
How I accidentally built a tech startup — without any technological knowledge
How I accidentally built a tech startup — without any technological knowledgeHow I accidentally built a tech startup — without any technological knowledge
How I accidentally built a tech startup — without any technological knowledgeDharmendra Rama
 
Computer engineering: A deeper perspective
Computer engineering: A deeper perspectiveComputer engineering: A deeper perspective
Computer engineering: A deeper perspectiveDharmendra Rama
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?Dharmendra Rama
 
With pandemic-era acquisitions,big tech is back in the anti trust crosshairs
With pandemic-era acquisitions,big tech is back in the anti trust crosshairsWith pandemic-era acquisitions,big tech is back in the anti trust crosshairs
With pandemic-era acquisitions,big tech is back in the anti trust crosshairsDharmendra Rama
 
Apple, Google rework coronavirus tracking tech to address privacy concerns
Apple, Google rework coronavirus tracking tech to address privacy concernsApple, Google rework coronavirus tracking tech to address privacy concerns
Apple, Google rework coronavirus tracking tech to address privacy concernsDharmendra Rama
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19Dharmendra Rama
 
21 tech gadgets we use to boost our productivity and comfort when we work fro...
21 tech gadgets we use to boost our productivity and comfort when we work fro...21 tech gadgets we use to boost our productivity and comfort when we work fro...
21 tech gadgets we use to boost our productivity and comfort when we work fro...Dharmendra Rama
 
Android for beginners: Tips and tricks for your new smartphone
Android for beginners: Tips and tricks for your new smartphoneAndroid for beginners: Tips and tricks for your new smartphone
Android for beginners: Tips and tricks for your new smartphoneDharmendra Rama
 
13 Smart Ways To Measure Your Tech Team's Productivity
13 Smart Ways To Measure Your Tech Team's Productivity13 Smart Ways To Measure Your Tech Team's Productivity
13 Smart Ways To Measure Your Tech Team's ProductivityDharmendra Rama
 
Computer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic partsComputer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic partsDharmendra Rama
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020Dharmendra Rama
 
Computer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic partsComputer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic partsDharmendra Rama
 

More from Dharmendra Rama (20)

The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
 
Adding Incident Response Containers To The Cyber Security Tool Belt
Adding Incident Response Containers To The Cyber Security Tool BeltAdding Incident Response Containers To The Cyber Security Tool Belt
Adding Incident Response Containers To The Cyber Security Tool Belt
 
CORSAIR VENGEANCE A4100 GAMING PC REVIEW
CORSAIR VENGEANCE A4100 GAMING PC REVIEWCORSAIR VENGEANCE A4100 GAMING PC REVIEW
CORSAIR VENGEANCE A4100 GAMING PC REVIEW
 
MINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMES
MINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMESMINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMES
MINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMES
 
How to build a gaming PC — and why you should
How to build a gaming PC — and why you shouldHow to build a gaming PC — and why you should
How to build a gaming PC — and why you should
 
How to Build a Gaming PC for Under $1200
How to Build a Gaming PC for Under $1200How to Build a Gaming PC for Under $1200
How to Build a Gaming PC for Under $1200
 
Cyber attack hits Lion
Cyber attack hits LionCyber attack hits Lion
Cyber attack hits Lion
 
How I accidentally built a tech startup — without any technological knowledge
How I accidentally built a tech startup — without any technological knowledgeHow I accidentally built a tech startup — without any technological knowledge
How I accidentally built a tech startup — without any technological knowledge
 
Computer engineering: A deeper perspective
Computer engineering: A deeper perspectiveComputer engineering: A deeper perspective
Computer engineering: A deeper perspective
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
With pandemic-era acquisitions,big tech is back in the anti trust crosshairs
With pandemic-era acquisitions,big tech is back in the anti trust crosshairsWith pandemic-era acquisitions,big tech is back in the anti trust crosshairs
With pandemic-era acquisitions,big tech is back in the anti trust crosshairs
 
Apple, Google rework coronavirus tracking tech to address privacy concerns
Apple, Google rework coronavirus tracking tech to address privacy concernsApple, Google rework coronavirus tracking tech to address privacy concerns
Apple, Google rework coronavirus tracking tech to address privacy concerns
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19
 
21 tech gadgets we use to boost our productivity and comfort when we work fro...
21 tech gadgets we use to boost our productivity and comfort when we work fro...21 tech gadgets we use to boost our productivity and comfort when we work fro...
21 tech gadgets we use to boost our productivity and comfort when we work fro...
 
Android for beginners: Tips and tricks for your new smartphone
Android for beginners: Tips and tricks for your new smartphoneAndroid for beginners: Tips and tricks for your new smartphone
Android for beginners: Tips and tricks for your new smartphone
 
13 Smart Ways To Measure Your Tech Team's Productivity
13 Smart Ways To Measure Your Tech Team's Productivity13 Smart Ways To Measure Your Tech Team's Productivity
13 Smart Ways To Measure Your Tech Team's Productivity
 
Computer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic partsComputer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic parts
 
Dharmendra Rama
Dharmendra RamaDharmendra Rama
Dharmendra Rama
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
Computer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic partsComputer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic parts
 

Recently uploaded

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 

Big Tech, Privacy, and Power

  • 1. T First Principles Big Tech, Privacy, and Power The power of Big Tech has been growing slowly, and in a way that many of us have accommodated as a necessary infiltration. But the scope of that power—and its costs to the culture we have ordered—have been less transparent. he ground is shifting quickly beneath our feet when it comes to tech, privacy, and power. And, although tech companies, their advocates, and even some policymakers, would like us to imagine these issues are cut and dried, they are not. In their book The Sovereign Individual [https://www.amazon.com/Sovereign-Individual-Mastering- Transition-Information/dp/0684832720] , published on the eve of the year 2000, James Dale Davidson and William Rees-Mogg attempt to grapple with the forthcoming technological changes By Rachel Bovard • April 25, 2020
  • 2. That a private company can now unilaterally decide to simply delete the promotion of protests it deems unacceptable is a remarkable expansion of its power over what was once a sacrosanct and constitutionally protected that the new millennium inevitably would bring. “As technology revolutionizes the tools we use,” they wrote, “it also antiquates our laws, reshapes our morals, and alters our perceptions.” This is the dynamic that has been unfolding slowly over the last 20 years, as Google, Facebook, Twitter, and other social media platforms have transformed how we engage with communications, culture, commerce, and one another. But the COVID-19 pandemic has pushed that transformation into overdrive, while exposing just how significantly power dynamics—between individuals and corporations, and individuals and the state— have shifted. Earlier this week, Facebook announced it was removing posts intended to organize rallies protesting government stay-at-home policies in various states. Initially, a Facebook spokesman claimed the company was doing this at the behest of state governments. Nearly 12 hours later, the company clarified [https://thefederalist.com/2020/04/21/facebook-isnt-actually-colluding-with-state- governments-but-its-still-removing-protest-posts/] it was independently removing posts “when gathering[s] do not follow the health parameters established by the government.” Facebook did not clarify if this meant gatherings in violation of state laws, or executive orders with no force of law, or merely violations of government suggested practices. This opens up a new, concerning lane for Facebook, and for tech more broadly. As Big Tech cements itself as our primary facilitator of communication (as it most certainly has during this pandemic), it wields outsized power. Kalev Leetaru at George Washington University recently pointed out [https://www.realclearpolitics.com/articles/2020/04/22/facebooks_covid- protest_ban_renews_censorship_concerns_143003.html] the significance of this shift, and the lines that blur as a result:
  • 3. freedom. As we cede the public square to private companies, however, those constitutional freedoms of speech and expression no longer apply in some cases. Through those private companies, in fact, government officials can in effect restrict speech they are obligated to protect. The irony is that less than a year ago, Mark Zuckerberg gave a speech [https://www.washingtonpost.com/technology/2019/10/17/zuckerberg-standing-voice-free- expression/] at Georgetown University where he extolled tech’s many virtues, including how tech platforms “have decentralized power by putting it directly into people’s hands.” Yet Facebook’s most recent actions confirm that power of communication for the 70 percent [https://www.pewresearch.org/internet/fact-sheet/social-media/] of American adults who use Facebook, rather than being made disparate, is still very much centralized in the tech platform. YouTube has also put itself in the position of defining “correct” speech—but this time, by aligning itself with the World Health Organization. YouTube’s CEO announced [https://www.dailywire.com/news/watch-youtube-ceo-well-remove-any-content-that-goes-against- who-recommendations] that the platform would remove “anything that would go against World Health Organization (WHO) recommendations.” YouTube’s apparent motivation is to keep people safe from misinformation—which makes their choice of WHO recommendations an interesting one. In mid-January, the organization was telling the world that COVID-19 wasn’t contagious. WHO also publicly opposed [https://www.technologyreview.com/2020/01/30/275959/the-china-coronavirus-is-officially-an- international-emergency/] the travel restrictions put in place by multiple countries and didn’t declare coronavirus a pandemic until March 11. All along [https://amgreatness.com/2020/04/18/who-are- you-a-pattern-of-deceit-at-the-world-health-organization/] , the organization has taken China’s obviously false claims at face value, allowing the virus to spread. Yet this is the banner behind which YouTube will fly its “user safety” flag, thus imposing WHO’s views on its massive user base [https://www.pewresearch.org/internet/fact-sheet/social-media/] . Tracking You—For Your Health.
  • 4. Then there is the thorny notion of contact tracing—the way in which public health experts attempt to contain a viral pathogen by tracing where an infected individual has been, and with whom they’ve been in contact. Traditionally, contact tracing has been analog, based on a conversation between patient and doctor. But the digital age has exploded contact tracing exponentially. It is much more efficient and accurate to trace a virtual trail, particularly as we leave immense digital footprints wherever we go. South Korea has typified this type of response, tracking [https://www.smartcitiesworld.net/news/news/south- korea-to-step-up-online-coronavirus-tracking-5109] COVID-19 patients using credit card data, surveillance camera footage, and cell phone location data. The South Korean government recently announced [https://en.yna.co.kr/view/AEN20200411000500320] they’d be requiring infected individuals to wear electronic wristbands to ensure patients did not breach quarantine. It is unlikely U.S. citizens would tolerate such intense and mandatory surveillance measures. But that’s where Big Tech comes in. Without being asked, Google already has been sharing aggregate user location data with governments interested in compliance with social distancing measures. The House Freedom Caucus, a group of conservatives, sent a letter [https://twitter.com/freedomcaucus/status/1248677702875439107?s=20] to Google raising concern over the “frightfully detailed, specific, and granular” data being provided to government officials. Google and Apple recently have announced the development of a contact tracing technology that will use cell phone Bluetooth proximity data to alert individuals if they have come into contact with an infected person. The app’s effectiveness depends upon people self-reporting their own positive diagnosis. Already, security experts have raised concerns [https://themarkup.org/ask-the- markup/2020/04/14/will-googles-and-apples-covid-tracking-plan-protect-privacy] about false positives, spoofing, re-anonymization, and “proximity marketing” (yes, you’re just trying to avoid getting sick, but tech advertisers could still make money). Experts [https://www.protocol.com/oped- john-ackerly-surveillance-coronavirus] have also pointed out how easy it would be for this system to be abused [https://www.marketwatch.com/story/this-could-be-abused-privacy-experts-take- cautious-approach-to-apple-and-googles-coronavirus-contact-tracing-technology-2020-04-16] .