The war over your personal privacy is over. You Lost!

The top five ways the technological revolution was a war against you.

About 15 years ago, my high-school civics teacher (who would later be arrested in front of the class for refusing to pay income tax) invited a professor from a nearby college to talk to us about how the world was headed to hell in an Orwellian handbasket. He was mighty disappointed when the prof insisted instead that we were moving toward Huxley’s Brave New World, amusing ourselves into attention-deficient immobility.*

Thanks to the Net, they can both be right.

Attached please find five recent widely reported technology developments that, taken together, should discomfit even the most law-abiding, SUV-driving, politically oblivious latte-esthete Weekly reader. Roll the following five statements around in your head and see if you, too, don’t start feeling uneasy as you pedal your $2,000 road bike down to the co-op for your salmon steaks.

You no longer have the right

not to incriminate yourself.

Taking the Fifth is a nice tactic on Law and Order, but the point is virtually moot in real life; your body and history have already betrayed you. Your fingerprints are on file with such places as the bank, the DMV, and the welfare office; you can even be asked for a thumbprint to cash traveler’s checks (or write personal checks). Many well-meaning parents have even contributed their children’s fingerprints to government databases voluntarily, thanks to the allegedly ever-present specter of child abduction. (Show of hands, please, of everyone who’s had a child abducted. Now let’s see a show of hands for all those whose children have been stopped by police for vandalism, traffic violations, or worse. Now, how do you think those fingerprint files will be used?)

Your hair is of interest to thousands of potential employers and some schools, who find it provides a much longer-term drug-use profile than does the old-fashioned piss test. Your child’s treasured school yearbook doubles as a collection of mug shots for the local cops in many urban areas. And your banking and credit history—sensitive and personal data in the lives of even the most innocuous among us—is anybody’s baby if your bank decides to pimp it out. And your driver’s license info is for sale to telemarketers and insurance companies.

Even the open road isn’t so open these days. With devices such as Lo-Jack and GM’s Sensing and Diagnostic Module (which monitors your car to discover causes for mechanical failures and accidents), your vehicle can send information about your whereabouts and driving peccadilloes back to the manufacturer, or to the cops. The Sensing and Diagnostic Module has raised the ire of even sleepy old conservative William Safire, who doesn’t want his car spying on his bad driving habits. (He has apparently chosen to ignore the 2,400 police surveillance cameras monitoring the streets of his beloved New York, but every little bit helps.)

And thanks to the 1994 Crime Control Act, your DNA is scheduled to go on file nationally within the next few years. This data is available to federal, state, and local investigators, and there are precious few legal guidelines as to how it can be used. (Pondering the irony of a DNA database signed into law by Bill “Blue Dress” Clinton is left as an exercise for the reader.)

All these indignities are brought to you by databases—vast collections of tiny shards of knowledge. Once upon a time, it wasn’t possible to collect that much data on one person, and even if it were possible to collect it, it wasn’t possible to enter it in a computer in a timely fashion, and even if it were possible to collect it and enter it in a computer, it wasn’t possible to correlate it with all the other information in all the other databases. Those days are over, and the only legacy we have of them is a dire lack of laws regarding who owns the information the database has about you and what they can do with it. But we do know who doesn’t own it: you, buster. And by the way . . .

You have been priced out of the

marketplace of ideas.

As for your personal data, forget those clickpaths and cookies and other bits of online data, which most folks will happily exchange for a free PC or a chance at winning a VW Beetle or some shiny beads. What about your genetic history? Ask the good people of Iceland, whose government in December sold the rights to the entire country’s health, genetic, and genealogical info to deCODE Genetics, who in turn has licensed it to Swiss pharmaceutical mega-company Hoffman-LaRoche. No one was asked to sign consent forms—and once an individual’s info is in that database, she can’t ask to have it removed. Someone else quite literally owns the rights to her.

Artistic endeavors fare no better. The public will lose public-domain rights to millions of early 20th-century texts in the next few years, and not a single artist will cease starving in a garret because of that. (But the publishing companies are thrilled—potential 21st-century Net content paid for at early 20th-century rates!) Thanks to late US Rep. Sonny Bono, the Copyright Term Extension Act keeps works from entering the public domain for the life of the artist plus 70 years, or in the case of a “corporate creator” (e.g., Walt Disney) for 95 years—in both cases, an increase of 20 years. It’s no coincidence that the copyright on über-icon Mickey Mouse would have expired in 2003, or (more broadly) that thousands of movies and pieces of recorded music were edging into the public domain.

These extensions do not, however, protect artists. Writers, musicians, and illustrators will tell you that the average publishing contract these days forces the artist to sign away rights for “all media now or hereafter created”—in other words, everything but your immortal soul. Companies like Time-Warner and Warner Brothers realize that in the days of five zillion cable channels and Web sites, even the mustiest items in the library are valuable content. And you’ll pay for it.

Old media bad? Maybe. But new media are worse . . .

Dot-com businesses have little imperative to

stand up for you, the customer.

Dot-coms may be swashbuckling when it comes to financing and IPOs, but they’re timid as kittens when it comes to standing up for their clientele. For instance, Amazon.com has shown several times in the past few months that speaking to them in a sharp tone of voice will scare them enough to pull books off their un-shelves—a decision that earned the un-bookstore widespread derision from real booksellers, long accustomed to standing up for books threatened to be censored or banned.

Amazon leads by example, even in retreat. Auction giant eBay, which had planned to open a British version of itself this year, felt the chill and announced that it would not be offering its services after all. And naturally the original Church of Scientology complaint against an Amazon-offered book (which was, by the way, never banned from sale by British stores, whatever you may have heard) has opened the door to a slew of intimidation imitators—probably not the get-along-go-along result the company had in mind.

But Amazon’s not alone under the electronic dunce cap. Around the world, ISPs deny users access to various parts of the Net for fear of specious lawsuits. As I write this, an SOS has gone up from the UK, where provider Demon Internet has blocked customer access to certain Usenet areas under threat of a libel suit by one Dr. Laurence Godfrey, who has made something of a career of suing people he feels have defamed him on the Net. According to the UK courts, Demon is liable for damages if it does not prevent its users from reading the alleged libel on Demon news servers. Though Demon representatives claim to be confident of winning the libel case, they failed to appeal the liability ruling, which may in the end be the more damning precedent.

ISPs have themselves been the target of an increasing number of “John Doe” lawsuits, which hamstring individual users’ attempts to shield their identity. A John Doe suit is filed before the names of the defendants are actually known; the complainants’ lawyer can then subpoena an ISP or online service for the real name and personal information of the user they claim has done them wrong. (In fact, in some cases an actual lawsuit is overkill; the Digital Millennium Copyright Act makes it possible to issue subpoenas to get such information without any suit being filed.) Many of these suits have been filed by companies hunting down online detractors, but at least one has been filed by the Church of Scientology to obtain the identity of a former church member who has posted copyrighted Church texts in the past. That person responded to AT&T WorldNet’s dangerous lack of customer support, so to speak, in the only way he/she could: “I guess it won’t surprise anybody that because AT&T has put my life at risk [from] this harassment organization, I will be switching both Internet service providers and my long-distance service from AT&T to MCI.”

It’s not just the threat of litigation that’ll turn an ISP against a customer; sometimes all you have to do is pick up the phone. In 1998, Senior Chief Petty Officer Timothy McVeigh (no, not the bomber) was dismissed from the Navy after being outed by an America Online representative who received a phone call from a Navy investigator—with no warrant, no court order, no proof at all that AOL was legally bound to release the information that connected McVeigh to a user profile that said he was gay. AOL spokespeople said it was an accident that would never happen again; they say that they only read or disclose user information under a “valid legal process.” (Or until they get caught, apparently.)

Meanwhile, back at the office, pending legislation would allow software companies to disable (by remote control!) programs you bought and paid for. Allegedly, this protects companies from the scourge of piracy. But what happens the first time someone names, say, Microsoft as a party to a libel suit because Word was used to create the defaming pamphlet? If it came to light that Photoshop was the preferred graphics package of the Aryan Nation, wouldn’t it be good PR for Adobe to shut the Nation’s software down? What if a firm with known right-wing leanings such as Solid Oak Software was able to purchase the licensing and shutoff rights to software used by Planned Parenthood or the ACLU? And speaking of shutdowns . . .

Your government hires hackers to wage

undeclared wars in your name.

US government sites ranging from the FBI to the Department of the Interior have gotten walloped by hackers during the past few weeks, and the Feds are wringing their hands in the media about how these nasty hackers are simply common criminals and not making a political statement at all, whatever they claim. So what does it mean when the Feds enlist hackers to attack foreign governments and their sovereign rulers?

In May, Newsweek published reports stating that government hackers had been authorized to “diddle” with Serb president Slobodan Milosevic’s international bank accounts. Whether or not you regard that kind of news as mere FUD, it hardly inspires confidence in your own account’s security or sanctity. And what happens if you become an enemy of the state? (Can you imagine how much fun Dick Nixon could have had with a roomful of hackers and his Enemies List?)

You government allows—no, encourages

others to spy on you.

Can you imagine a system of spy posts and satellites that captures almost every e-mail, fax, phone call, or other transmission, scans it for certain key words and concepts, and files it (and you, the sender or recipient) for future reference? And what if the US, UK, Canadian, and other governments were working together to spy on each other’s citizens with such a device? It sounds like X-Files conspiracy fodder. Problem is, last month the Australian government admitted to The (Melbourne) Age that science fiction became science fact years ago.

The system is called Echelon, and it’s run by a five-country consortium called UKUSA, which for the past 50 years has been in the business of signals intelligence (“sigint”). In the US, Echelon’s operation falls in the bailiwick of the National Security Agency. But that’s not who’s spying on you: in a legal sleight-of-hand, the five countries work together to circumvent respective prohibitions on domestic espionage. A US agency can’t legally gather information on Americans—but under international law, a British (or Australian or Kiwi) agency can gather it and hand it off.

According to some published reports, Echelon automatically intercepts millions of messages per hour and feeds them into a system called the Dictionary, which parses them against “collection requirements” specified by the various spy agencies involved; messages with attention-getting content are routed to the requesting agencies. According to the Australian government, some of the current collection filters seek out Japanese trade-ministry plans, information on Pakistani nuclear capabilities, and various data on North Korea’s slide into the economic abyss. Economic information is in fact highly pertinent data for the signatory countries, and there are few restrictions on collecting it.

The computing firepower involved is prodigious, but it’s not unattainable. (Echelon also includes taps on the Net and, since 1971, on underwater cables.) It has been documented that Echelon monitors the communications infrastructures used by diplomats, criminals, and industrialists; what’s unknown is how far that net is cast and how much data is actually parsed. Worse, the heavy veil of secrecy under which Echelon has operated makes its workings opaque even to US government officials. The NSA likes it like that; when Congress recently requested more disclosure on Echelon-related information, the NSA declined to cooperate, citing (to the bafflement of Congress) attorney-client privilege.

The good news is that the US may be about to get its Echelon flakes frosted by the international community. Since the US and UK have been denying the existence of UKUSA for nearly half a century, one can only imagine how overjoyed they were to see the Australians on the record about it. Various European parliamentary bodies have commissioned reports to discover exactly what info Echelon tracks and what’s done with it; a number of companies (including Boeing nemesis Airbus) have already charged the US with redirecting sensitive information to “preferred” American competitors. And the backlash is widening: the UK, formerly in virtual lockstep with US calls for privacy “key escrow,” has suddenly stepped off the bus. (Key escrow allows private citizens to use data-protecting encryption, as long as the government is free to decrypt it—sort of like putting a lock on your door but being required to leave a key hanging next to the doorbell.)

Now, before you flip the page and forget about this cant, because all this wild-eyed talk is annoying and because the government isn’t really going to bother People Like Us because we’re not (choose one: criminals, addicts, foreigners, left-wing, right-wing, poor, rich, online shoppers, hackers, terrorists, of color), get this straight: You may not think you’re a dangerous commodity, and I sure may not think you’re a dangerous commodity, but that doesn’t matter. You’re being tracked, hacked, and attacked anyway—just in case—just like the rest of us.*

*According to a recent article in The Progressive Review, over 100 of the 137 predictors or indicators of a grim, totalitarian future in Orwell’s 1984 have already come to pass. As for the other side, one of the most promising e-commerce sites has named itself soma.com—a Brave New World homage that went almost entirely unnoticed.