<!–

–>

December 8, 2022

In the 1600s, we fought spice wars.  In the 1700s, we fought freedom wars — over-representation, taxation, and piracy.  In the 1800s, we fought slavery wars.  In the 1900s and 2000s, we fought oil wars.

‘); googletag.cmd.push(function () { googletag.display(‘div-gpt-ad-1609268089992-0’); }); }

Today, we’re in the midst of a data war.

Like most wars, there are psychological operations.  Reinforcement and other psychological techniques are used to drive increasing use and engagement, drawing incredible amounts of information from users.  Nudges, “dark” and “light,” are used to guide user decisions in directions determined by “wise ones,” leading mankind into a utopia described in bright colors.

I describe the shape and worldview behind this worldview in Unintended Dystopia.

‘); googletag.cmd.push(function () { googletag.display(‘div-gpt-ad-1609270365559-0’); }); }

Data are withheld to shape the beliefs of those on the battlefield.  Data releases are carefully timed to either increase or decrease their impact.  False data are intermixed with genuine, sowing confusion and making it impossible to tell the false from the true.

There are legal aspects, as well.  Governments are using their power to constrain the flow and storage of data to gain an economic advantage (often in the name of privacy — but like all other casualties in times of war, privacy is a much-misused idea).

At least from one perspective, Net Neutrality can be seen as content providers (like Google and Facebook) using the state’s power to prevent edge providers (like AT&T and Comcast) from collecting and using data about their users.  Privacy was invoked in these legal battles, but no one bothered to ask, “What am I keeping private from whom?”  Content providers, after all, still consume a very high percentage of the traffic on the internet.  Net Neutrality certainly isn’t hiding user information from these big content providers.

When Net Neutrality proved challenging to implement globally, many content providers turned to technical aspects of data warfare: end-to-end encryption.  Once again, however, we are not asking from whom end-to-end encryption keeps data private.  If the two end points are the user and a large-scale content provider, the only companies kicked out of the data feeding trough are edge providers.

Domain Name System over Secure Hypertext Transfer Protocol (DoH) can be seen as another instance of large-scale content providers cutting the “middleman” out of the data game by shifting the technology (once again in the name of privacy).  Those who own the Domain Name servers can still collect everything where users go on the internet.  Moving name lookups to the browser instead of the operating system allows Google to use Chrome (65% of the market) to gain control over where name queries are sent and processed.  In a parallel move, mobile operating systems are also moving to DoH.

As with all other wars, corporate interests make money, and pirates try to eat profits from the edges.  Data brokers commercialize user data at scale, even some of the most private — like medical data.  The pirates of this world are hackers who execute large-scale data breaches every week.