Wikileaks: Lessons For Consumer Privacy

The website Wikileaks recently published hundreds of thousands of confidential State Department cables. These communications apparently reveal the details of conversations with, and personal impressions and assessments of, foreign leaders and diplomats. Many fear that the leak will undermine international relations in profound and unknowable ways. One of the unintended consequence of the leak, however, may be to strengthen the case for a national consumer privacy law.

Intimacy would not be possible without privacy—as Charles Fried, Tom Gerety, Robert Gerstein, and Julie Cohen so effectively show. Privacy means that the individual may choose to whom to reveal the details of her inner life. A decision to trust begets trust, such that I will be more likely to reveal myself to those who reveal themselves to me. Escalating, mutual revelation is how friendships, families, and other intimacies often grow.

What is true of people is presumably true of states. Ground rules of confidence and secure channels of communication spark candor, which in turn breed trust and intimacy. Interstate intimacy has profound repercussions. Trust, won even through gossip, facilitates diplomacy and hence has the potential to avert hard power. As Steven Aftergood of FAS points out, “If Wikileaks were … anti-war, it would safeguard, not disrupt, the conduct of diplomatic communications.”

We should not take this analogy too far: there is a big difference between safeguarding interpersonal/state communications and hiding policy decisions. The former is necessary for effective diplomacy, the latter is potentially destructive to democracy. I certainly have a problem with, for instance, secret negotiations of a binding copyright treaty.

The cables reveal both confidences and policy. Everyone knows that even non-clandestine diplomats must keep their eyes and ears open, but the leaked communications reveal instructions from the State Department for diplomats to secure specific details about their counterparts abroad. Conversations and personal passwords alike can be aggregated and downloaded, converting intimate interpersonal meetings into utilitarian data points. Mixing diplomacy with intelligence gathering may be a poor policy decision in that it undermines the very trust required for intimacy.

But the twin lessons of Wikileaks should be obvious. And, I would argue, apply just as readily to companies and consumers as they do states. First, there must be a space for diplomatic and consumer candor. By consumer candor, I mean nothing more grandiose than a well-earned comfort in revealing to a business who you are and what it is you want, so that they can provide that thing to you.

Second, it is possible and often desirable to separate out functions such as diplomacy and sales from surreptitious information gathering activity. As with diplomats, companies do not earn trust by using every interaction with a consumer to profile them, much less by storing that information in a database that can, and often does, leak out.

Maybe these lessons will finally seep in. It took the revelation of video records of a prominent judge, after all, for Congress to pass the Video Privacy Protection Act. Here, again, we see bipartisan condemnation of the leak as disruptive to national security and damaging to U.S. foreign relations. Couple this rare point of agreement with a bipartisan consumer bill and an incoming Speaker who once filed a lawsuit under federal electronic privacy law and some real possibilities open up.

This article was written by Ryan Calo, and published under the Creative Commons Attribution 2.5 License.

Related Posts

No, iPhone location tracking isn’t harmless and here’s why It didn’t take long for the blogosphere to respond to research presented on Wednesday that detailed a file in Apple iPhones and iPads unknown to the v...
HHS Should Require the Encryption of Portable Devices Many companies use encryption on their portable devices, but the continuing parade of health data breaches demonstrates that too many organizations ha...
Extend the Enterprise into the Cloud with Single Sign-On to Cloud-Based services In this blog post we examine how Single Sign-On from the enterprise to Cloud-based services is enabled. Single Sign-On is a critical component for any...
Google Starts Censoring BitTorrent, RapidShare and More It’s taken a while, but Google has finally caved in to pressure from the entertainment industries including the MPAA and RIAA. The search engine now a...
Supreme Court to Decide Standard for Proving Invalidity of a Patent Today the U.S. Supreme Court agreed to hear Microsoft’s appeal in a case that could make it easier to invalidate a patent. If successful, Microsoft...
Game Changing Study Puts Piracy in Perspective To counter the many one-sided piracy studies that have been released by the entertainment industry in recent history, a group of dozens of academics h...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*