Feeds

Welcome to the out-of-control decade

We have seen the future, and it doesn't belong to you

Secure remote control for conventional and virtual desktops

Paranoia strikes (digitally) deep

Today, the internet is essentially a computing and communications space. During the next decade, a vast array of embedded-internet devices will hop aboard what was once jocularly referred to as the infobahn.

Be they supermarket barcode scanners, electronic toll collectors, ID-card readers, home refrigerators, smart electrical meters, healthcare devices, or whatever, being internet-connected these devices will all potentially be able to talk amongst themselves in the next decade's omniscient cloud, sharing data while cross-checking usage patterns.

All that data taken together will paint a highly detailed picture of you, your whereabouts, diet, health status, purchasing patterns, and lifestyle. And in some hands - say, those at the end of the long arm of the law or those clenched into an iron fist - that information could be used against you.

Don't get us wrong. You might feel perfectly comfortable with your life being an open book, agreeing instead with Google CEO Eric Schmidt's peculiar notions of privacy. As he recently told CNBC. "If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place."

The operant word in Schmidt's smug statement is "anyone." He assumes a benevolent, paternalist "anyone" who's just like you and me, and keeps us good folks safe by watching out for terrorists, pedophiles, and other odious "thems". In Schmidt's world, there's a "them" and an "us".

If only life were that simple. It isn't.

The definition of "them" is a highly mutable one. Here in the United States, citizens out of step with the dominant political philosophy have been regularly designated as "them," and subjected to both extra-legal and legal-but-selective scrutiny - think of the McCarthy years, the late 1960s, and the post-9/11 hysteria, for example.

A patchwork of legal protections currently exists to protect against the unfettered tracking of such digital droppings as your location, buying practices, financial dealings, and health records. Although that protective shield is in clear need of consolidation and strengthening, it exists. Today, at least.

But data is an increasingly valuable commodity. And wherever there's value to be found, there's money to be made - and that money will fund an army of lobbyists to fiscally twist pliant lawmaking arms to weaken those protections.

The phrase "increasing shareholder value" is a talisman of almost religious power these days, matched only in its magical inarguability by its working-class mirror mantra of "job creation". Expect both of those incantations to crop up in data-deregulation debates during the out-of-control 2010s, no matter which political party is in power.

Information about you is worth money. Big money. But to take an even darker view, it might be worth your life.

Come a significant breach in public security - a "9/11 redux", if you will - and data safeguards will evaporate. Poof. Faced with an existential threat - whether real, imagined, or trumped up - the Schmidt philosophy will rule, and personal privacy and protection will dissolve.

This is not news. Just ask the 100,000 or so Japanese Americans from California, Oregon, and Washington who received all-expense-paid vacations in sunny Arizona, Utah, Wyoming and elsewhere during World War II.

The difference during a security crisis in the 2010s will be that there's so much more data that avid dot-connecters might use to implicate possible "thems" - and that the majority of that potentially incriminating data is increasingly out of your control.

Those datapoint dots can be reassembled into narratives that suit the goals of the reassembler. As has been proven in many a grad-school psych project and as sung by Paul Simon in the key of B major, "A man hears what he wants to hear and disregards the rest."

And there will be many, many dots for those narrative builders to choose from. Today, as we ease our way into the out-of-control decade, tracking your habits and whereabouts is mostly either helpful or benign. In the San Francisco Bay Area, for example, a FasTrak electronic toll-collection devices helped one motorist recover her stolen car by reporting that car's comings and goings.

In Blighty, although an enormous network of CCTV cameras make UK citizenry the most watched-over in the world (there are over one million cameras in London alone), when it comes to crime-fighting the system is a joke. One report, for example, determined that one crime was solved per 1,000 CCTV cameras in London.

But electronic fare collection and CCTV are mere baby steps. During the next decade, information collection will expand by leaps and bounds. Advances in location-awareness, for example, may add passenger information to vehicle tracking, then extend that tracking beyond mere checkpoint monitoring to continuous surveillance. CCTVs will add more-infallible-than-not face detection and will thus be able to track individuals' movements from camera to camera to camera.

If you're a dot-connecting prosecutor with a narrative to build, you're going to have plenty of info with which to construct your argument. And if you're Mr. or Ms. Average Consumer, you'll have little or no control over your own dots.

And it's Mr. and Ms. Average Consumer - or, more correctly put, billions of Mr. and Ms. Average Consumers - who will find themselves increasingly out of control in the coming decade.

You, dear reader, as a technically sophisticated consumer of technology, can choose to avoid such relatively benign losses of control as Apple lock-in. You can also work your way around Google's multi-tentacled grip on your personal information and web activities. With sufficient effort, you can also keep most of your personal digital dots out of the cloud, where they could otherwise be pounced upon by those who might want to rewrite your narrative to their own ends.

But Mr. and Ms. Average Consumer can't. You might be able to retain a modicum of control during the coming decade, but most folks won't be able to.

They'll be out of control. ®

New hybrid storage solutions

More from The Register

next story
Not appy with your Chromebook? Well now it can run Android apps
Google offers beta of tricky OS-inside-OS tech
Keep that consumer browser tat away from our software says Oracle
Big Red decides it will only support Firefox's Extended Support Releases
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
WordPress 4.0 is here, complete with one-click upgrade process
Don't relax yet, sysadmins, there's still a chance for some big messes here
NHS grows a NoSQL backbone and rips out its Oracle Spine
Open source? In the government? Ha ha! What, wait ...?
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.