|
Online data capturing Hardly a firm today can afford not to engage in electronic commerce if it does not want to be swept out of business by competitors. "Information is everything" has become something like the Lord's prayer of the New Economy. But how do you get information about your customer online? Who are the people who visit a website, where do they come from, what are they looking for? How much money do they have, what might they want to buy? These are key questions for a company doing electronic business. Obviously not all of this information can be obtained by monitoring the online behaviour of web users, but there are always little gimmicks that, when combined with common tracking technologies, can help to get more detailed information about a potential customer. These are usually online registration forms, either required for entry to a site, or competitions, sometimes a combination of the two. Obviously, if you want to win that weekend trip to New York, you want to provide your contact details. The most common way of obtaining information about a user online is a But cookies record enough information to fine-tune advertising strategies according to a user's preferences and interests, e.g. by displaying certain commercial banners rather than others. For example, if a user is found to respond to a banner of a particular kind, he / she may find two of them at the next visit. Customizing the offers on a website to the particular user is part of one-to-one marketing, a type of One-to-one marketing can create very different realities that undermine traditional concepts of demand and supply. The ideal is a "frictionless market", where the differential between demand and supply is progressively eliminated. If a market is considered a structure within which demand / supply differentials are negotiated, this amounts to the abolition of the established notion of the nature of a market. Demand and supply converge, desire and it fulfilment coincide. In the end, there is profit without labour. However, such a structure is a hermetic structure of unfreedom. It can only function when payment is substituted by credit, and the exploitation of work power by the exploitation of data. In fact, in modern economies there is great pressure to increase spending on credit. Using credit cards and taking up loans generates a lot of data around a person's economic behaviour, while at the same restricting the scope of social activity and increasing dependence. On the global level, the consequences of credit spirals can be observed in many of the developing countries that have had to abandon most of their political autonomy. As the data body economy advances, this is also the fate of people in western societies when they are structurally driven into credit spending. It shows that data bodies are not politically neutral. The interrelation between data, profit and unfreedom is frequently overlooked by citizens and customers. Any company in a modern economy will apply data collecting strategies for profit, with dependence and unfreedom as a "secondary effect". The hunger for data has made IT companies eager to profit from e-business rather resourceful. "Getting to know the customer" - this is a catchphrase that is heard frequently, and which suggests that there are no limits to what a company may want to about a customer. In large online shops, such as But there are more advanced and effective ways of identification. The German company Bu there are much less friendly ways of extracting data from a user and feeding the data body. Less friendly means: these methods monitor users in situations where the latter are likely not to want to be monitored. Monitoring therefore takes place in a concealed manner. One of these monitoring methods are so-called Bugs monitoring users have also been packaged in seemingly harmless toys made available on the Internet. For example, The cursor image technology relies on what is called a GUID (global unique identifier). This is an identification number which is assigned to a customer at the time of registration, or when downloading a product. Many among the online community were alarmed when in 1999 it was discovered that However, in the meantime, another possible infringement on user anonymity by Microsoft was discovered, when it as found out that MS Office documents, such as Word, Excel or Powerpoint, contain a bug that is capable of tracking the documents as they are sent through the net. The bug sends information about the user who opens the document back to the originating server. A document that contains the bug can be tracked across the globe, through thousands of stopovers. In detailed description of the bug and how it works can be found at the Of course there are many other ways of collecting users' data and creating appropriating data bodies which can then be used for economic purposes. Indeed, as Bill Gates commented, "information is the lifeblood of business". The electronic information networks are becoming the new frontier of capitalism. |
|
|
|
Security Measures? The more so-called security measures are taken the more control and the less freedom is granted. Whereas criminals are flexible in their computer work/digital existence, the average person cannot be. So it is her/him who gets punished with an increase of control. Of course security can be in favor of the population as well - and this is the case if cryptography is legal so that everyone has access to it to protect his/her data. This one needs for e-commerce, secure payments and transmission of private data, mostly e-mails or access to websites where one needs a password. E-mails are nothing else than postcards, letters without envelopes. Without encryption they are easy to open, read and trace back, even without knowing the password. Rumors that Echelon works with a list of key-words, controlling any e-mail in the world and reacting to words of that list, led to actions like the Jam Eschelon Day, last time held on October 21st, 1999, to confuse the espionage system. for more information on Jam Eschelon Day see: But the respect for privacy stands for an essential values in democratic societies. So, how can it be regarded a governmental risk? At a conference: "How many people here fear a greater risk from government abuses of power than from criminal activity?" The majority raised their hands, one participant shouted "What's the difference?" (anonymous) If governments really care for the people and want to fight against cybercriminality they should rather support the work on the latest technologies for encryption than to restrict their access. Or even better: they should not intervene at all - to make sure they do not build in any trapdoors. Though it is already too late for discussion like this one as the trapdoors are already part of most of the key-systems. Rumors about PGP and trapdoors do not help the confidence in cryptology. for information about the risks of cryptography see: |
|
|
|
Waihopai Station Waihopai Station on the South Island of New Zealand was established specifically to target the international satellite traffic carried by Source: Nicky Hager, Secret Power, New Zealand's role in the international spy network, (Craig Potton, 1996), Chapter 2 |
|
|
|
Menwith Hill Station Menwith Hill Station is one of the biggest groundstations in the |
|
|
|
Sun Microsystems Founded in 1982 and headquartered in Palo Alto, USA, Sun Microsystems manufactures computer workstations, For more detailed information see the Encyclopaedia Britannica: |
|
|