Monday, April 2, 2012

Five ways to protect your Internet Freedom

Americans love to brag about the freedoms that democracy affords them.  And for good reason.   Americans can speak their mind, travel anywhere in the country, and freely join groups, assemble  to worship, freely choose healthcare, education, sports teams to cheer, military service, and so  many things.

What about privacy and digital identity?

There is little argument among Americans about Internet access and freedom to search and roam the  entertainment content that is offered by a variety of providers for free or as a part of a paid service  that adds additional value to the user.  In some cases the provider offers increased access speed  or bandwidth; in others free content, Internet access gateway, email accounts, spam and malware  protection, etc.  And the future seems to be rich with emerging opportunities, services, and new  games, entertainment, and options for the user.

Computing technologies themselves continue to develop at a frightening pace, with smaller, more  mobile devices being developed, manufactured, and sold.  Even the amount of money included in many  21st century family budgets includes the purchase of new smartphones every couple of years and the  option for many to also own tablets, laptops, and other lightweight, mobile devices.  It seems  that we want more content, more quickly, and whenever we need or want it.  And we want RedBox,  Netflix, Hulu, Roku and other devices and broadband services to deliver it to us.

One key factor of the technology explosion is the pace of information access and the ease of its  transfer.  The eBooks that my Smartphone can access are always with me.  The movie or TV show can  be selected and streamed instantly wherever I may be and whenever I want it.  The days of waiting  a week for the family to sit in the living room to watch the next episode of All In the Family are  still with us, but have undergone radical change in terms of our choices of location and time.

Today these options are available under a couple of caveats:  We must be in range of a cellular  phone tower or a Wi-Fi access point; We must have contracted with our device provider for  sufficient bandwidth to transfer the information; We must be capable of affording the monthly  charges for such flexibility and capability.  The truth is that we might already have a bookcase  at home with a hardcopy of the book stored there.  We might also have a tape or DVD or the movie  or TV show.  We might also already own a DVR at home that holds a recorded copy of the movie or  show to be viewed at home at a later time.  And we might even own one of the newer devices that  enables us to stream content we already own or home-based services we already pay for to our  mobile devices.  Either way, the same rules or constraints still apply. 

As participants in and consumers of our rapid-paced technologies, we decide whether to acquire a  hard-copy book and store it at home or download it from iTunes or Amazon to our iPad or Kindle or  Smartphone.  And it’s really cool (or maybe lazy) not to have to expend energy trying to remember  to pack the book or throw it into the back seat of the car so it will be there when we get to the  airport or doctor's office and need it.

Our access to all this technology is controlled by our digital identity.  "We" become the devices  we carry and the flow of information to and from the services we select directly from the provider  or via the Internet is controlled by authentication that "we" do when we select the service.   Facebook, Twitter, email, chat, Skype, sports contests, listening to music, watching movies and  shows, all are controlled by the authentication turnstile that we set-up seamlessly on our mobile  gadgets.  But each of these is unique AND separate until we grant them permission to interact with each other out of sight and out of mind.

But there's so much more to the background interaction that lays hidden in the "weeds" of the  landscape.  The weeds analogy seems appropriate because few of us really want weeds in our gardens,  but they always seem to be a consequence.  As we use our mobile gadgets to do the things we do, we  leave a digital trail that is recorded or followed by virtually anyone who wants to.  No, we're  not being stalked in the traditional sense, even though our location on the surface of our planet  may be known or recorded, however.  As may be our buying, viewing, reading, content habits as well  as the locations, providers, or content of the select variety of sites and services that we enjoy,  however appropriate or prurient they may be.  The following technologies or marketers can then  sell the information about our trail to other Internet vendors who want to target us with their  products and services. 

Now is this a bad thing?  The answer depends, of course on whether you are a naive teen-ager,  marketing consultant, or homeland security official.  While there are a few laws and regulations  in place to deter or prevent this activity (CAN Spam, DO NOT TRACK, etc.), there is also no  coordinated international regulatory body or set of laws to stop it. 

Our recommendation for unwary users is simple: 
1.  Care about your identity and privacy. 
2.  Choose reputable hosts, providers, and protection services. 
3.  Secure your access credentials and control how and when they are shared.
4.  Read and understand your providers' privacy and security policies
5.  Report suspicious activity to the FBI

Be careful and become better informed.
Show Comments: OR