The Internet of Nudes — is this what we wished for?

December 14, 2014

The widespread release of nude photographs across the internet is not confined to celebrities like Jennifer Lawrence – sexy “selfies” are going “viral” among teenagers too.

In just a couple months between August and October 2014, thousands of hacked digital photographs – many of them of naked or semi-dressed young people and celebrities – found their way into the public domain.

sexy selfie meme

The typical chain of events involved some geeky hackers announcing that they’d accessed some kind of online storage space that was supposed to be under secure digital lock and key, and were going to upload racy and compromising photographs to somewhere on the web where anyone with an internet browser would be able to see them.

Images of nude celebrities form a kind of sick digital currency in some murky corners of the internet. On sites like 4chan and Reddit there are (or at least were) publicly accessible threads with names like “The Fappening” where such images were posted. The people who posted them – usually anonymously – were considered the coolest hackers because of their ability to forage around and steal the images from mobile phones or other sources.

Both Reddit and 4chan had “rules” that supposedly prevented illegally obtained or copyright-breaching images being uploaded, but the rules were pretty much ignored by everyone involved until a big public scandal drew attention to them.

For the people who break into smartphones or cloud storage servers to steal the private images there is kudos and ego-satisfying status in the hacker community; for the (largely) pubescent male viewers there is the prospect of sexual titillation and the excitement of sharing in something a little bit dirty and a whole lot of illegal.

However, for the celebrities whose images are stolen there is only anger and potentially embarrassment.

Many of the young stars were outraged, and the public backlash against the hackers was severe. Star of the Hunger Games movie franchise, Jennifer Lawrence, was particularly outspoken. She called the hacking a sexual assault and several other victims of the hack – who were mainly young, attractive women – joined her condemnation of everyone who posted and reposted the images.

In a long interview published in the October 2014 edition of Vanity Fair, Lawrence spoke of her anger and embarrassment, but she also stood up for her right to participate in the taking of the images and to share them with her partner:

The 24-year-old actress had not previously commented on the incident, but she spoke to [Vanity Fair journalist, Sam] Kashner at length about the anger she felt. “Just because I’m a public figure, just because I’m an actress, does not mean that I asked for this,” she says. “It does not mean that it comes with the territory. It’s my body, and it should be my choice, and the fact that it is not my choice is absolutely disgusting. I can’t believe that we even live in that kind of world.

Lawrence also lashed the celebrity gossip blogger, Perez Hilton, who had been one of the first to repost the stolen images of Lawrence and others. Lawrence told Vanity Fair:

He took it down because people got pissed, and that’s the only reason why. And then I had to watch his apology. And what he basically said was, ‘I just didn’t think about it.’ ‘I just didn’t think about it’ is not an excuse. That is the exact issue itself.

It was a scathing attack on Hilton who has made himself as famous and rich as the celebrities he targets on his website. Hilton had already apologised for putting up the hacked nude photographs, and he went further in an interview saying that he would not do it again and that he realised he’d made a terrible ethical mistake in originally republishing the photos. Perhaps Hilton was feeling so contrite because the phone hacking scandal at the News of the World newspaper in the UK was still so fresh in the public’s memory .

When asked what prompted his change of stance about publishing intimate celebrity photos, Hilton told website Digital Spy: “I look at mistakes as an opportunity to learn. I made a mistake and instead of not doing anything I decided not to post any photos of anybody like that going forward, which I haven’t.”

Perez also told Digital Spy that having a child of his own made him more conscious of how his behaviour might affect other people: “I’ve been trying to do better and be better for four years now. I’m not perfect, I’m not trying to be, but it’s a constant journey and a process.”

The dump of nude celebrity images, reportedly stolen from their iCloud accounts, was not the first incident of its kind, but the outcry seems to have been more effective this time in shutting it down. But it won’t perhaps prevent it from happening again.

In the age of television shows like Big Brother, The Bachelor and Dating Naked encouraging all of us to be voyeurs on the private moments of people subject to constant surveillance for our pleasure, it his not hard to believe that more hacks and more photo-dumps will occur.

At the end of the day the commercial success of “pervy” television means that while there’s a buck to be made from voyeuristic surveillance, others will try to cash in. Not only that, many of us consider celebrities fair game; they make their money from exposure and from selling themselves – via television, movies, music videos or their own self-promotion of “branded” material – so they shouldn’t be surprised when our interest in their private lives goes beyond what they might be contractually obliged to share with us.

This doesn’t make it ethically “OK” for us to download their hacked images for our own viewing pleasure, nor does it justify sleazy ex-partners or former friends from selling their “sex tape” escapades to pornographers – but it does explain why it still happens. Sex sells, and illicit sex sells for an even higher price. There will always be unscrupulous people willing to exploit weaknesses in human nature, or digital exploits on secure servers.

I find it hard not to agree with Jennifer Lawrence: hacking is like breaking into someone’s house to steal from them. When the images that are stolen are personal and private then it does become a sex crime, as Lawrence told Vanity Fair:

It is a sexual violation. It’s disgusting. The law needs to be changed, and we need to change. That’s why these Web sites are responsible. Just the fact that somebody can be sexually exploited and violated, and the first thought that crosses somebody’s mind is to make a profit from it. It’s so beyond me. I just can’t imagine being that detached from humanity. I can’t imagine being that thoughtless and careless and so empty inside.

Everybody’s doing it: What could go wrong?

It’s not only celebrities whose private images are stolen; it can happen to anyone. In early October 2014 it was widely reported that users of the mobile social app Snapchat had also been caught in a targeted hacking operation that meant potentially tens of thousands of people were going to see their private photos made public.

selfy screen grabThis event, in which perhaps close to 100,000 images were uploaded to a public server, has been dubbed the “Snappening”, a semantic cross-reference to the celebrity hack the “Fappening”. The issue here is that many of the stolen images were of young teenagers, many of them under 18 years old. This created the added danger that anyone sharing or accessing the images could be accused of transmitting or downloading child pornography – a very, very serious offence.

This is a curious story because the popular Snapchat app allows users to send images and short videos to each other, but the program deletes them after a short period of time. However, there are third-party apps that work with Snapchat to allow users to save files forwarded to them without the sender’s knowledge. According to news reports it was one of these apps, Snapsaved, that was actually hacked and where the images were leaked from.

It’s not entirely clear if the leaked images did or did not make it onto a public website but, if they were, they were quickly taken down. What we do know is that the notorious 4chan community was again involved, although some users claim that it, too, was hoaxed by the original scammers.

Snapchat is incredibly popular with young users – about 50% of its estimated 30 million users are aged 13–17. To protect its reputation, the company is aggressively attempting to have apps like Snapsave shut down.

A Snapchat spokeswoman told The Huffington Post: “We can confirm that Snapchat’s servers were never breached and were not the source of these leaks.

“Snapchatters were victimised by their use of third-party apps to send and receive Snaps, a practice that we expressly prohibit in our Terms of Use precisely because they compromise our users’ security,” the spokeswoman said.

However, it’s not always anonymous geeky hackers who breach our trust. A Sydney University student was recently disciplined for sharing images of a semi-naked female colleague with his friends. He had taken the picture during a consensual sexual encounter with the woman, but without her consent. The picture was then circulated among the man’s friends.

In the United States, 31 teenagers at a high school near Detroit are being investigated in a widespread “sexting” scandal. According to police investigating the case, the practice of teenagers sending and receiving nude or semi-nude images of each other is “widespread”.

Attorney Shannon Smith told the Detroit News: “This is happening everywhere, it’s over the top. I have been contacted by schools and parents elsewhere in Oakland, Macomb and Wayne counties who have found similar photos on their children’s cellphones and want to know what to do about it.”

Well, perhaps there’s a difference between consensual sexting and hacking someone’s phone or private server, but if images are being shared then they are probably circulating to a wider group than the original sender intended. Officials are also worried about people being put under pressure, even bullied, into participating.

Surely there’s got to be a lesson in this somewhere, but what is it? Well, it’s easy for me – a middle-aged academic who doesn’t use Snapchat or post nude selfies on iCloud – to say: “Don’t post nude selfies!” However, I realise that such advice sounds trite and that thousands, if not millions, of people ignore it every day. However, there is some point in being careful about your privacy in online and social media environments.

If someone does feel pressured into sexting then they should certainly be telling someone about it. Under any circumstances, “No!” must mean exactly that. Nobody should be bullied into doing anything they don’t want to do.

The famous whistleblower (of, if you’re the American government, the infamous traitor) Edward Snowden recently gave his version of my advice at a conference he was asked to speak at. According to Snowden, everyone who cares about their digital privacy should stay away from popular consumer internet services like Dropbox, Facebook and Google.

“Facebook and Google! OMG! That’s a disaster, right?” Yes, I know that’s what you’re all thinking, because I’m thinking it too. How can anyone live today without being on Facebook or using Dr Google to answer all our difficult questions?

Well, Snowden thinks we should all be using encryption tools and finding online and social media services that support encryption. You can also use anonymous routers to disguise your location from prying eyes on the web too. And don’t forget to delete your browser history whenever you’ve finished surfing the web.

Of course, encrypting phone messages, emails or Skype chats only works if the person you’re communicating with is also using the encryption service. Once a message is encrypted (i.e. scrambled so that nobody can read it) it has to be unscrambled at the other end. This is not yet an easy and everyday thing for us to do. It is complicated and can be expensive, but maybe it is what we all have to consider.

Maybe if Jennifer Lawrence and the other hacked celebrities had been using an encrypted cloud server nobody would have been able to access their files, or at least not been able to unscramble them to share with anyone else.

But if you’re sending sexy selfies to your beau, then encrypting them is going to take the “sexy” out for sure. The problem is perhaps that we have to trust other people in order to keep our secrets safe – and that isn’t always possible.

The best thing is to be careful, remember that privacy is your right and only you can consent to it being breached.

First published in Issues magazine, December 2014

Issues109


Big Data is the DNA of Big Brother

December 14, 2014

Big Data” has become a popular term in information technology and business circles, but what is it and what should we think about it?

“Big Data” is often talked about reverently and passionately by its exponents and its supporters. According to them, “big data” can solve a myriad of economic and social problems; it will mean a faster and more efficient digital economy that is responsive to the needs of both consumers and producers.

Industry will love “big data”, we are assured, because it will mean less waste, more targeted advertising, and a better “fit” between knowing what consumers want and the ability to stock retail shelves with the right goods. For service providers, “big data” means easier connections with those seeking their help and expertise.

In short, “big data” is wonderful, it will benefit all of us and there’s nothing to worry about.

If this sounds too good to be true, it’s probably because it’s more than likely we haven’t yet found the hidden fish hooks – the problems and worrying unanswered questions – that might cause us to think twice before jumping into the “cloud” with the “big data” enthusiasts.

So let’s start with a simple definition, an answer to what should be your first question: “What is ‘big data’?”

“Big Data” refers to the vastly expanding mountains of information that can today be gathered and stored on fast-running servers (supercomputers) and in the “cloud”. The “cloud” is another term that needs some discussion in this context because it is everywhere and nowhere at the same time.

Cloud computing and “big data” go hand-in-hand. The “cloud” is a fancy name for off-site storage of data using a network of supercomputers. Several companies are now offering retail cloud services, including Google and Apple’s iCloud.

Big Data is the type of material that can be stored in the cloud and retrieved via the public Internet or over a secured point-to-point private system. Big Data is often associated with the “three Vs” of information architecture – volume, velocity and variety.

Volume is just that – the exponentially growing amount of information that we generate each day through online transactions, social media interactions, emails and files that we send and receive. This represents a business opportunity for some and, to others, a vast trove of secrets to be uncovered.

ibm-big-dataVelocity is about speed – the pace at which new data is created and exchanged in both structured and unstructured ways. Harnessing this speed is also a business opportunity. On the global money-trading market, for example, an advantage of just seconds can mean the difference between a profit and a loss on any one transaction.

Variety is also about complexity as data comes in many forms – some are innately useful (e.g. documents, plans, financial records) while others are less structured (e.g. our tweets and Facebook status updates, our online “likes” and Instagram snaps). However, being able to marry these things together is what “big data” is really all about.

If it is possible to know where I am, who I am connected to via social media, what I like to spend my money on and, more importantly, how much disposable income I have, then my data becomes a marketing goldmine. When all of this is connected to my GPS-enabled smartphone, and my every move can be monitored, I cannot escape the siren call of seductive advertising that is all about “me”. It’s personalised to my tastes and it is designed to empty my virtual wallet quicker than I can refill it at the end of a working week.

So at the heart of “big data” is another important definitional “V” word – “value”. No amount of data is worth more than the bytes it’s assembled from unless you can do something with it. And in terms understood implicitly in a capitalist economy, “doing” something with the mountains of data now stored in the “cloud” means monetising it.

Data is monetised when value can be added and subtracted. By turning data into a commodity it can be priced, bought and sold. In other words, somebody, somewhere will be making money from the data – mine, yours and everyone else’s.

At this point we lose control over our own data; we become the objective of big data and cloud computing, not its subjects. Our data belongs to someone else and what they do with it is entirely up to them.

Did you read the fine print before signing up to Facebook or that new cool app for your phone that allows you to locate the nearest new cool bar? No? I didn’t either, and most of us don’t.

In fact, those who control “big data” would prefer we didn’t read the T&Cs. That’s why they are usually a gazillion pages long in 6-point type, and all the nasty bits are buried so deep in that you’d need a team of lawyers and a million dollars to read and understand them. In short, what you are doing when you lazily click “Agree” is giving away all and any rights now and in perpetuity to the data that you are about to hand over to Faceless Corporation.com. What they then do with your data is none of your business, even though it is all about your business.

Everything that Faceless Corporation.com knows about you and every new bit of information that you share when you use their apps and visit their website is suddenly part of “big data” and it now has value.

When the insignificant tidbits you share on social media are all aggregated, sorted, mashed, crunched and scrunched, the analysts at Faceless Corporation.com know more about you than your grandmother, and perhaps even more than your GP.

This information can then be sliced, diced, interpreted and amplified by new incoming data. It is then packaged up by Faceless Corporation.com to be commodified and on-sold to someone else – let’s say Buy This Junk.com – who will then bombard your inbox or your Facebook or your Twitter feed with advertising for their own products and services. If you, for example, use Buy This Junk.com to order a new widget then within days, if not hours, if not minutes, you will see in your social media feeds advertisements for widget-holders, widget-cleaners, widget reseaters and all kinds of widget-related paraphernalia that you didn’t even know you needed.

But now, at least you know why this is happening: Faceless Corporation.com sold your data to Buy This Junk.com and they, in turn sold your data to the companies that service the wide world of widgets and widget fanciers. Of course this is an endless chain. If you were to buy some widget-cleaning goop from Widgets R’Us.com they will, in due course, also be packaging up data about you and your widget-keeping habits. The next thing you know… well, you get the picture.

My example might seem trivial, but the point I’m making is not. Big Data is about recording, storing, surveilling, quantifying and monetising every aspect of our lives beyond anything we might have imagined even a decade ago. There is literally no place to hide anymore, unless you go completely off the grid.

There is a carrot-and-stick effect associated with “big data” that makes going “off-grid” unattractive, if not almost impossible. If you don’t agree to the T&Cs you don’t get the benefit, the goods or the services. Now it is getting worse because we are moving in the direction of a “cashless society”; everything will be done from smart cards, smartphones or even (if the scientists are right) from implanted biometric chips that store our credit and our identities and that are always on and always scannable. If there is GPS tracking as well then, short of digging out the chip with a scalpel, we can never disappear.

This is the beginning of what I have described as the “surveillance economy” – a capitalist system in which the drive to encapsulate everything within “big data” is the engine driving economic growth and profitability. In a system prone to crisis – as global capitalism inevitably is – “big data” looks to some like a panacea, the golden goose and the fountain of economic youth. Unfortunately, I do not share this utopian view of the surveillance economy and if you can read Robert O’Harrow’s 2005 book No Place to Hide you will begin to understand why.

Control of “big data” is in the hands of global transnational corporations that operate to increase shareholder value, not for the benefit of the public interest. Big Data is being harnessed by these corporations in order to control economic activity now and into the future, and it is being done with the full knowledge, support and encouragement of governments around the world.

logentries-big-data

Perhaps I don’t need to spend much time on this aspect of “big data”. Here in Australia we are now familiar with the Federal government’s recent moves to increase the data surveillance powers of ASIO, ostensibly to keep us safe in a dangerous world filled with terrorist threats. However, perhaps we should be alert to, and alarmed about, new laws that appear to give security agents the ability to monitor the entire internet on the basis of one warrant and to keep information about their spying activities out of the public domain.

Critics of “big data” – in both its commercial and its government guises – argue that we will no longer have any real hope of personal privacy at the same time that secrecy surrounding the actions of corporations and government agencies is increasing. I agree with them.

It’s clear from the documents provided by the brave and vilified whistleblowers, Chelsea Manning and Edward Snowden, that Australia is heavily involved in the so-called “Five Eyes” syndicate of Western powers who are also the leading nations prosecuting yet another war in the Middle East on the pretext of fighting global terrorism. This alliance is led by the US National Security Agency (NSA), which is the world’s leading financier of research into making the collection and storage of “big data” even more efficient.

In fact, there’s another book that you should read that can explain all of this in much more detail than I can in the space left to me here. The book is also called No Place to Hide by American journalist Glenn Greenwald, who worked with Edward Snowden on the release of the NSA’s files last year. What he discovered is quite shocking. The NSA works to the principle of “collect everything” and is in the process of making this slogan a reality. I worry about this and I think you should too.

The alternative to dropping off the grid is to stand up and take back control over your own data. It’s not going to be easy, but we have no choice.

There is no place to hide.

First published in Issues magazine, December 2014

Issues109