Curiouser and curiouser
We read in the media much hype about the intrusion of the state authorities into our personal data. Gathering information about when and which numbers have phoned or SMS’d each other (outrageous!) or which e-mail address has had conversations with which others. So is it true? Do they do it? Yes, of course they do - it amazes me that Edward Snowden’s comments were presented as revelations by the broadcast media. It strikes me as very odd that people are apparently more upset about their personal information being analysed by governments than by multi-national corporations - but perhaps that’s because I don’t think I have to worry as much as some about my government abusing my rights.
Government agencies throughout the world analyse any data they can acquire to try to identify people acting against the interests of the state and its people (or the dictator in power at the time). In countries with well developed and empowered legal systems this power to gather and analyse data is sometimes and somewhat curtailed by law, and in democratic or semi-democratic states these laws are often defined by the people’s representatives. The initial gathering of information is rarely done by the state - most data is accumulated first by various service providers and is then aggregated and analysed by the state agencies. Like any other organisations the state agencies typically have limited budgets and need to get value for money in all their efforts but can apply for greater budgets if they can demonstrate a return on the investment. So they’re not going to waste their time on stuff which they think a ‘lesser’ agency should deal with. For example the FBI will not be interested in local drug dealing unless it will lead to resolving a nation-wide (Federal) problem.
So, your state accumulates information and applies unfair techniques to analyse the data to the potential detriment of some of the people? Well yes: to the detriment of anti-state actors - but it’s only unfair if we were not expecting our data to be used that way. So what were you expecting? The majority of these data analysis techniques were developed and adopted by the advertising and marketing industry to identify the targets best suited for particular campaigns. Do we object to our service providers pooling and analysing our data to try to sell us something? Most of us apparently do not - until it gets too intrusive - or we find ourselves considered to be anti-state actors.
Obviously, if we get labelled as an anti-state actor we should be concerned. If it’s true then our cover has been blown and we should run away now. If it’s false and we have not prepared anywhere to run to then things could get really uncomfortable for us - especially in places where the government agencies can override the law whenever they feel like it. However, if it comes down to a difference of opinion (one man’s rebel is another’s freedom fighter) then it gets really tricky. So, ‘on the Internet’ which are you? ‘Glorious freedom fighter intent on changing society to the correct course’ or ‘despicable rebel disrupting the ordered running of the state and the lives of the people’? Probably neither. Most of us are just trying to buy stuff and have it delivered rather than going to find it in the shops or complaining about government services to our friends (‘They really should do something about… «fill in your favourite gripe here»’).
Because information about you is valuable, your state has a limited interest in curtailing the data gathering of large companies - until, of course, they refuse to hand over that data to the state agencies. Some companies’ whole business is based on gathering, cross-referencing and analysing your data with no actual ‘product’ to show for it. A large ‘social media’ company can only afford to run all the servers it uses to gather information from its users through selling access to that data to advertisers and marketeers - obviously not selling or giving away the data itself, they retain control so they can sell the access again and again to different customers. Think about it. Data about you is valuable to advertisers. Why? Is it valuable to anyone else? Again, why?
Other people are curious about us. Finding stuff out about us can give them an advantage in selling stuff to us or negotiating some other deal with us. For example, knowing about your (lack of) residency rights or local language skills might give an unscrupulous employer the edge in negotiating a lower than usual wage for your employment. Our lawmakers can try to wrap all sorts of safeguards (additional rules, regulations and laws) around this sort of thing but unscrupulous people will seek out loopholes and exploit them.
Various organisations are interested in knowing as much as possible about us - this knowledge is valuable to them. If they don’t deal with our data in accordance with the law, then they are acting illegally. In which case there’s no real difference between them and any other organised crime gang.
Oh, but I’m nobody interesting. Who would be interested in my data? Well, I’m nobody too - and here’s a table showing failed attempts by uninvited strangers to log in to my home server over the past month (with a limited number of consecutive failed attempts permitted). If someone already knows stuff about you from social media account(s) then how many log in attempts would they need to guess your password? Yes, YOU. Your password.
Username | # attempts |
---|---|
root | 905 |
admin | 312 |
nagios | 236 |
ubnt | 184 |
MGR | 46 |
user | 32 |
Administrator | 26 |
test | 21 |
operator | 17 |
a | 16 |
FIELD | 16 |
MANAGER | 16 |
15 | |
support | 13 |
guest | 12 |
login | 12 |
HELLO | 8 |
PlcmSpIp | 8 |
super | 8 |
blank | 7 |
ftpuser | 7 |
cisco | 6 |
superuser | 6 |
sysadmin | 6 |
webadmin | 6 |
apache | 5 |
bin | 5 |
cusadmin | 5 |
ftp | 5 |
info | 5 |
mysql | 5 |
setup | 5 |
sysadm | 5 |
system | 5 |
ADVMAIL | 4 |
craft | 4 |
diag | 4 |
install | 4 |
maint | 4 |
network | 4 |
nologin | 4 |
supervisor | 4 |
username | 4 |
webmaster | 4 |
admim | 3 |
D-Link | 3 |
david | 3 |
fluffy | 3 |
library | 3 |
monitor | 3 |
nobody | 3 |
oracle | 3 |
pi | 3 |
sales | 3 |
Service | 3 |
tech | 3 |
web | 3 |
www | 3 |
xxx | 3 |
1234 | 2 |
3comcso | 2 |
acc | 2 |
addon | 2 |
adm | 2 |
adminttd | 2 |
adrian | 2 |
airlive | 2 |
alex | 2 |
Alphanetworks | 2 |
amanda | 2 |
anna | 2 |
anonymous | 2 |
apc | 2 |
at4400 | 2 |
barbara | 2 |
bbsd-client | 2 |
bciim | 2 |
bob | 2 |
browse | 2 |
bruce | 2 |
cellit | 2 |
cgadmin | 2 |
citel | 2 |
claudia | 2 |
client | 2 |
cmaker | 2 |
comcast | 2 |
corecess | 2 |
dadmin | 2 |
davox | 2 |
debug | 2 |
default | 2 |
device | 2 |
dhs3mt | 2 |
dhs3pms | 2 |
draytek | 2 |
DSL | 2 |
DTA | 2 |
emily | 2 |
Factory | 2 |
fidelity | 2 |
five | 2 |
git | 2 |
hsa | 2 |
hscroot | 2 |
iclock | 2 |
IMMMMMMFAKKKE | 2 |
inads | 2 |
intel | 2 |
IntraStack | 2 |
IntraSwitch | 2 |
isa | 2 |
isp | 2 |
JDE | 2 |
jerry | 2 |
kermit | 2 |
linux | 2 |
LUCENT01 | 2 |
LUCENT02 | 2 |
maintainer | 2 |
manage | 2 |
manuf | 2 |
marie | 2 |
martin | 2 |
master | 2 |
MD110 | 2 |
MDaemon | 2 |
mediator | 2 |
mtcl | 2 |
netman | 2 |
netrangr | 2 |
netscreen | 2 |
NICONEX | 2 |
office | 2 |
op | 2 |
patrol | 2 |
PBX | 2 |
PCUSER | 2 |
PFCUser | 2 |
pgsql | 2 |
piranha | 2 |
Polycom | 2 |
recovery | 2 |
rk | 2 |
scout | 2 |
security | 2 |
shell | 2 |
SPOOLMAN | 2 |
storwatch | 2 |
superadmin | 2 |
superman | 2 |
SYSDBA | 2 |
technicom | 2 |
telecomadmin | 2 |
tester | 2 |
tiger | 2 |
unix | 2 |
USERID | 2 |
vodafone | 2 |
volition | 2 |
vt100 | 2 |
vyatta | 2 |
websecadm | 2 |
wlse | 2 |
wlseuser | 2 |
word | 2 |
WP | 2 |
xbian | 2 |
1 | 1 |
1.79 | 1 |
2 | 1 |
3 | 1 |
4 | 1 |
5 | 1 |
6 | 1 |
7 | 1 |
1502 | 1 |
11111 | 1 |
31994 | 1 |
266344 | 1 |
adam | 1 |
adfexc | 1 |
admin2 | 1 |
adminpldt | 1 |
adminstat | 1 |
adminstrator | 1 |
adminuser | 1 |
adminview | 1 |
ADSL | 1 |
alan | 1 |
anderson | 1 |
angel | 1 |
Any | 1 |
backup | 1 |
bcms | 1 |
bcnas | 1 |
blue | 1 |
brett | 1 |
cablecom | 1 |
cac_admin | 1 |
ccrusr | 1 |
CSG | 1 |
cust | 1 |
d.e.b.u.g | 1 |
danny | 1 |
data | 1 |
deskalt | 1 |
deskman | 1 |
desknorm | 1 |
deskres | 1 |
disttech | 1 |
dragon | 1 |
e250 | 1 |
e500 | 1 |
echo | 1 |
emma | 1 |
enduser | 1 |
eng | 1 |
engmode | 1 |
enquiry | 1 |
flogin | 1 |
games | 1 |
Gearguy | 1 |
GEN1 | 1 |
GEN2 | 1 |
george | 1 |
GlobalAdmin | 1 |
gordon | 1 |
halt | 1 |
helpdesk | 1 |
HPN | 1 |
http | 1 |
httpd | 1 |
ident | 1 |
images | 1 |
init | 1 |
installer | 1 |
intermec | 1 |
john | 1 |
l2 | 1 |
l3 | 1 |
locate | 1 |
lp | 1 |
m1122 | 1 |
ma | 1 |
marina | 1 |
medion | 1 |
michael | 1 |
MICRO | 1 |
mikael | 1 |
mike | 1 |
mlusr | 1 |
mso | 1 |
mtch | 1 |
naadmin | 1 |
NAU | 1 |
netadmin | 1 |
netopia | 1 |
news | 1 |
nfsnobody | 1 |
nms | 1 |
on | 1 |
paul | 1 |
poll | 1 |
PRODDTA | 1 |
PSEAdmin | 1 |
public | 1 |
radware | 1 |
rapport | 1 |
rcust | 1 |
readonly | 1 |
readwrite | 1 |
replicator | 1 |
resin | 1 |
richard | 1 |
RMUser1 | 1 |
ro | 1 |
robert | 1 |
router | 1 |
RSBCMON | 1 |
rw | 1 |
rwa | 1 |
sara | 1 |
scan | 1 |
scmadmin | 1 |
search | 1 |
sharon | 1 |
shop | 1 |
smc | 1 |
Sorin | 1 |
SSA | 1 |
ssh | 1 |
stephen | 1 |
steven | 1 |
stf | 1 |
stratacom | 1 |
stud | 1 |
student | 1 |
sunny | 1 |
sunsun | 1 |
surecom | 1 |
susan | 1 |
suva | 1 |
sweex | 1 |
sys | 1 |
target | 1 |
telco | 1 |
telecom | 1 |
telekom | 1 |
temp1 | 1 |
tiara | 1 |
tmadmin | 1 |
topicalt | 1 |
topicnorm | 1 |
topicres | 1 |
ts3 | 1 |
UNIDEN | 1 |
user3 | 1 |
v | 1 |
vbox | 1 |
vcr | 1 |
VNC | 1 |
webpop | 1 |
witpack | 1 |
wradmin | 1 |
write | 1 |
www-data | 1 |
wwwrun | 1 |
xbox | 1 |
xd | 1 |
z | 1 |
ZXDSL | 1 |
Post a comment
All comments are held for moderation; simple HTML formatting accepted.
Send feedback by e-mail , alternatively complete the form below.