News
3/21/2008
10:38 PM
Terry Sweeney
Terry Sweeney
Commentary
50%
50%

But Cling If You Must To The Illusion Of Privacy

I'm trying to work up a head of steam over the presidential candidate passport snooping. But my contract with TechWeb limits my self-righteousness to certain decibel levels, which, frankly is quite smart when the subject is data privacy.

I'm trying to work up a head of steam over the presidential candidate passport snooping. But my contract with TechWeb limits my self-righteousness to certain decibel levels, which, frankly is quite smart when the subject is data privacy.That, plus I thought I probably emitted all the harrumphs I possibly could over the snooping in Britney Spears' medical files earlier this week. So there won't be any more calling the wrath of justice down on the overly curious.

Instead, the takeaway here is that personal data snooping is common, pervasive, and probably considered a perk by those who do it. As Machiavelli might have said, "What good is access to information if you don't use it?"

A lot of what makes the personal information of pop stars and presidential candidates so enticing is that they're public figures. That information also can be used for blackmail, commercial gain, or political advantage. But my bet is that Medicare files, Social Security contributions, or tax returns get reviewed (and passed around, and talked about) way more often than we care to think about.

The difference is the tabloids don't care about my peccadilloes or yours, and my political opponents are much more obsessed with the wall I built along my driveway. (Built to code or not? Do your own snooping.) And god only knows what your enemies are trying to dig up on you.

Speaking of peccadilloes, this also circles back to former New York governor Eliot Spitzer. His downfall, as we all know now, was triggered by automated reviews of financial transactions he was making. The point: There's a good deal of legal scrutiny that's completely transparent where our bank accounts, credit cards, and phone records are concerned.

So whether you and your big sunglasses appear frequently on page one of the National Enquirer, or you're just another member of the great unwashed, let's save the self-righteousness about infringement on personal privacy. Hooray for well-meaning laws, but they don't lock down the personal bits and bytes any tighter.

In this era of data mining and an information-based economy, personal privacy's no longer a reasonable expectation. Those days are long passed.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2130
Published: 2015-03-05
Cisco Secure Access Control Server (ACS) provides an unintentional administration web interface based on Apache Tomcat, which allows remote authenticated users to modify application files and configuration files, and consequently execute arbitrary code, by leveraging administrative privileges, aka B...

CVE-2014-9688
Published: 2015-03-05
Unspecified vulnerability in the Ninja Forms plugin before 2.8.10 for WordPress has unknown impact and remote attack vectors related to admin users.

CVE-2015-0598
Published: 2015-03-05
The RADIUS implementation in Cisco IOS and IOS XE allows remote attackers to cause a denial of service (device reload) via crafted IPv6 Attributes in Access-Accept packets, aka Bug IDs CSCur84322 and CSCur27693.

CVE-2015-0607
Published: 2015-03-05
The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connecti...

CVE-2015-0657
Published: 2015-03-05
Cisco IOS XR allows remote attackers to cause a denial of service (RSVP process reload) via a malformed RSVP packet, aka Bug ID CSCur69192.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.