Feeds

Ancient satire foretold AOL's privacy disaster

Igor, to the machines! We have a sample...

Top three mobile application threats

Behold: The Mighty Atom

Fifty years ago, scientists did things like, oh... split the atom, and deduce the shape of the DNA double helix. Today, working off the hottest and freshest evidence available, scientists proclaim breakthroughs such as "People get more drunk at weekends".

Once upon a time scientists set out to describe the unknown, and make it understood in mechanical terms. But now, like a group of well meaning, but slightly simple lifelong in-patients making their first tentative steps into the real world, they venture out to find what's on their doorsteps.

Now, if science is to have any useful purpose in society, it's in describing the unknown, not the bleeding obvious. No wonder it has gotten such a bad name recently.

How much easier it would have been, we suggest, if internet companies had from the outset sought what they would eventually publish anyway: the boring and creepy things that people type into their computers.

If good jokes can tell us truths that are otherwise unmentionable, then perhaps satire can offer us a glimpse of the future that futurologists dare not mention.

In fact, it just has.

AOL's privacy fiasco was foretold by a splendid prank some Register readers will recall from a few years ago, which looks even better this week than it did at the time.

Brian Del Vecchio created a spoof site called AIMSearch, announcing it with the following:

"In November of 2001 AOL Time Warner, responding to a subpoena from Attorney General John Ashcroft, made available to the Justice Department a complete archive of all private conversations held over AOL Instant Messenger (AIM). Through the power of the Freedom of Information Act (FOIA), Google was able to obtain a copy of this entire logfile, totaling over 2 terabytes of conversations previously thought to be private."

Then came the kicker:

"This unique resource provides insight into the minds of potential anti-American terrorists, cheating spouses, and countless computer neophytes."

And so we have it. Within a fortnight, Google had objected to the misuse of its trademark, and the prank ceased.

AIMSearch - your private thoughts recorded, and published

But how much easier it would have been, for this new generation of "scientific" sociologists, who thanks to data sets like AOL's query database claim to know so much more than we do about ourselves, and who place so much value on the internet's "hive mind", (cf. technology utopian Joi Ito) if it had been clear at the time who was speaking to whom.

The author of the prank, Del Vecchio told us, today -

"Back in 2002, just a few months after 9/11, we wondered how people would react if AOL were to cave to demands from the government and massively betray user privacy. We wanted them to feel that betrayal like a kick in the gut, even if just for a brief second," he wrote.

"Four years later, there is still a huge gap between the privacy that users imagine they have, and the laxity with which service providers like AOL guard that privacy. I think users like 711391 may be feeling that kick in the gut right now."

Indeed. We all are.

On the other hand, user 711391 ("christian women caught in extramarital affairs") really needs help.

And spare a thought for the fellow who typed in "how to murder your wife" dozens and dozens of times. Surely, by now, he'll be feeling some disappointment that the much vaunted internet, this fabled electronic communications medium, hasn't yet conjured forth an elite squad of Ninja Assassins to finish her off.

People will always type dark and dirty thoughts into computers - we guess that's why public, open computer networks were invented, as a kind of public sinkhole. But to turn these private writings into a basis for a new sociology seems to be a little presumptive.

In fact, taking anything that's typed into the public sinkhole seriously ought to worry us. The "murder my wife" chap is a staple of Northern folklore - he may well one day die a peaceful death having done nothing more harmful than forget to feed his cat. Meanwhile, there are law enforcement agencies, who following the same scientific principles of guesswork and presumption as the "AOL scientists", who may be keen to argue otherwise.

So if science is to devote itself to this collection of data, may we suggest it be careful. Or preferably, find more pressing issues with which to concern itself. ®

Build a business case: developing custom apps

More from The Register

next story
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Philip K Dick 'Nazi alternate reality' story to be made into TV series
Amazon Studios, Ridley Scott firm to produce The Man in the High Castle
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.