Back to National Journal
37 of 48 results     Previous Story | Next Story | Back to Results List

09-02-2000

TECHNOLOGY: Stories From the Privacy Frontier

* Using stolen credit card numbers, a thief masquerading as Robert Hartle
spent more than $100,000, got fired, filed for bankruptcy claiming a debt
of $44,000, and was involved in a car accident-all without the real Robert
Hartle's knowledge. The genuine Hartle, from Phoenix, Ariz., spent $15,000
on a detective service, which used commercial data banks to track down the
thief, who was subsequently jailed. Such identity-theft crimes are on the
rise, partly because thieves can get the private data needed to falsely
acquire credit cards, bank loans, and other valuables.

* Wireless phone operators will soon be able to track their users' locations to within a small area. Location data can provide a useful service to customers, such as monitoring the whereabouts of cell phone-using children. But it could also allow the phone operators to track the location of their customers during the day, creating opportunities for advertisers or others with an interest in tracking a person's movements.

* Government regulators have forced banks and pressured grocery chains to open new facilities in low-income areas. This is possible only because regulators can comb through the companies' data, marketing plans, census information, real estate databases, and other information.

* Employees at Apple Computer thought the Internet offered a safe haven for them to talk anonymously about their at-work gripes without exposing their identities to company managers-until the company sued the employees' Internet service providers to reveal the employees' identities. The still-undecided legal claim argues that the anonymous Internet users are revealing company trade secrets on the Internet, but privacy advocates say it is an effort to silence dissent.

* Technology forecasters expect the public's demand for the Internet's communications capacity to rise sharply during the next few years. One way to alleviate the likely traffic jams, they say, will be for online customers to buy either a high or a low priority for their messages. For example, a company could afford to pay the Internet provider extra each month to ensure its transatlantic video conferences are not interrupted, while a middle-income family could cut its monthly online bill by accepting a lower priority for the kids' e-mails. The problem? It would require that an identification code be affixed to every high- or low-priority message, thereby helping the Internet provider to watch how their customers use the Internet.

* The Usenet is the Internet's precursor, a lightly organized cyberarena for chat groups and picture libraries. But if people use the Usenet to chat about products or services, such as a new auto, the Web site Deja.com will append advertising-related links to these individuals' personal comments. The comments and ads are then seen by the many people who use Deja.com to search the Usenet for useful information.

National Journal
Need A Reprint Of This Article?
National Journal Group offers both print and electronic reprint services, as well as permissions for academic use, photocopying and republication. Click here to order, or call us at 202-266-7230.

37 of 48 results     Previous Story | Next Story | Back to Results List