上网时间: 2013年11月29日? 作者:Tom Mahon? 我来评论 【字号: ? ?小】


Engineering, Security & Privacy

Tom Mahon, Journalist

Apple's famous Super Bowl ad that introduced the Macintosh computer assured us that the year 1984 would not be like Orwell's 1984. Instead of slavishly lining up to do the bidding of, and be under total surveillance by, Big Brother, we were assured we were entering a new age of personal freedom, creativity, and autonomy.

Fast forward a quarter century, and now Apple's iProducts -- and others -- have instead established the infrastructure for a total surveillance state that tracks everything we say, do, read, write; and traces everywhere we go, who we go with, and what we do when we get there.

Yet even after the Snowden documents proved what many long suspected, we continue to send our private lives into "the cloud" knowing that NSA meteorologists are tracking it.

But what are we to do? Go back to postal mail? Or stop hanging out with distant friends and family members on Skype? Not gonna happen.

Not only are our communications tracked, but there is also the possibility that a convoluted NSA algorithm might eventually put together an offhand reference you made to the Koran in a 1998 email, along with a later search for Persian rugs, and still later an expressed interest in the history of the atomic bomb, and conclude that you are connected to Iran's nuclear program. And you, of course, would never know why you are now on a no-fly list.

Before the communications revolution made it so easy for private correspondence to be monitored by the state, the right to privacy had never been explicitly enshrined as a human right, except by inference.

Perhaps the most specific statement in US history is the Fourth Amendment to the Constitution (1792), which affirms "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures..."

But the framers of the Bill of Rights could no more imagine email, cookies, Facebook Likes, and Google searches than the authors of the Second Amendment could image AK -47s and Saturday Night Specials.

So in the space of only 20 years, everyone in the connected world has awakened to the fact that s/he has no clearly spelled out right to privacy in any of her or his thoughts, words, or actions. The entire contents of our lives are open to the state, and to commercial firms whose databases are in turn hacked by state security systems. And Moore's Law will only increase that intrusiveness in coming years.

Why bring that up in an electronics publication? Isn't this a matter for lawyers and civil libertarians? Indeed, but it was also the ingenuity of tens, probably hundreds, of thousands of electronic, computer, and software engineers whose development of the Internet yielded these unintended consequences.

Without overlooking the legitimate needs for the state to track bad actors before they can commit bad actions, there must be a limit to that surveillance. Security achieved at the loss of any personal privacy is no security at all.

And there is something very disingenuous about the fact that emails between 10-year-olds are no longer private, yet someone who is seriously deranged can buy a high-powered weapon and carry it around in a public space with no oversight. Is this electronic surveillance meant to protect us, or cow us into a state of total, dispirited submission?

We are long overdue for a national discussion on privacy, and like it or not, the electronics industry, which has seldom been asked to consider the social consequences of its work, will soon find itself at the center of this storm, and asked to devise protocols and filters that can distinguish between signals of information from "bad actors" and the noise of the actions of billions of people who just want to get on with their lives.

As citizens are made to see themselves merely as perpetual suspects in an ill-defined and unending "war on terror," respect for the law will diminish. Which will only make the security state bureaucracy even more paranoid, and in need of even bigger budgets, staffs, and powers.

Engineers and others in the digital industry can be rightly proud of the many, many benefits their work has made possible. It would be a shame to see that effort eventually perceived by the public not as liberating and enlightening, but as intimidating and threatening. Like it or not, the engineering enterprise will soon find itself immersed in "humanistic" affairs.

There are patches that sophisticated consumers can use to cover themselves, like Tor and DuckDuckGo, but it is going to take an industry-wide systemic approach to really address this issue. And technology companies in particular have every reason to want secure transmissions, so their own IP (Intellectual Property) doesn't get cribbed and disseminated using the other IP (Internet Protocol).

[ 投票数:? ] 收藏 ??? 打印版 ??? 推荐给同仁 ??? 发送查询 ??? ?订阅杂志

  • 安防监控
  • 便携设备
  • 消费电子
  • 通信与网络
  • 分销与服务
  • 制造与测试
  • 工业与医疗
  • 汽车电子
  • 计算机与OA
  • 电源管理
  • 无源器件与模组
  • 新能源
  • 供应链管理
  • 什么是互联网隐私?
  • 国际电子商情提供相关互联网隐私技术文章及相关互联网隐私新闻趋势,及更新最新相关互联网隐私电子产品技术

Global Sources




Datasheets China.com