Introduction to Internet and Computer Privacy Invasions

---------------------- multipart/related attachment
--=-IY7n8w/MPFPYTN9PGkPe
Thanks to Richard Pitt for the following learned dissertation about
INTERNET Privacy.  Richard is the webmaster for the CENTA.COM site.  He
and his partenr Stuart Lynne have the honour of being the first
commercial ISP (Internet service Provider) in Canada started back in
1986. An afficiando will recognize WIMSEY.COM and the original internet
people's addresses such as [email protected] (Ken Bell was the Business
Editor a the Province Newspaper) or [email protected] when Mark Schneider
would sign off on BCTV.  Read on. - Oh by, the way;  I have asked that
the whole article be right here rather than the common method of putting
a teaser paragraph here and you click on it to go to the actual article
on the main server.  That is what started the whole thing because if you
pass on the note, someone else clicks on to our website with a fixed IP
address and we know who they are or can set it up so that we know who
they are by trapping their address when they hit the site.
 
Thanks Richard - You can get hold of richard directly by calling him at
604 644-9265 or emailing him at [email protected].  
 
Oh, and good luck in 2004.  Happy New Year, Season's Greetings and all
that Jazz!
 
david ingram
                          An Introduction to 
                   Internet/Computer Privacy Invasion
              (or how they figure out who is a "live" one)
My friend David Ingram sent me an e-mail yesterday (December 28) to
which I replied, including the original message. He phoned me a few
minutes later and asked whether I'd actually seen the image he'd sent me
in the original e-mail as it was not in the reply.
I explained to him that, since the form of the original e-mail was from
a web site and all he'd done is tell them who to send it to, the image
was not in the message - it came from the original web site. My e-mail
software strips HTML image URLs and simply puts "[image]" into such
replies. His original had actually come from a web site he had been
visiting - "Email to friend" (along with a brief explanation - they even
make it look like it came from you.)
I also said that because my system knew who the mail was from (his
e-mail address) I did in fact see the picture and the rest of the
graphics, but if the From address had not been one I'd saved in my
"Contact" list, I probably would not have seen them as I had set my mail
software to not load remote links in HTML mail in such a case. While
David's been using e-mail since the early 80s, he didn't realize that
the fact that I'd viewed e-mail could be tracked by the original web
site.
This got us to talking about all the various ways the "bad uglies" out
there take advantage of unsuspecting people to track and analyze who
does what and whether their techniques are working. Since I'd sent out a
"rant" about electronic greeting cards to my Christmas e-mail list this
year about a similar problem, he's asked me to write a column for his
CEN-TAPEDE newsletter. I'm going to concentrate on the "legitimate"
businesses in this article; the ones that are household names or part of
legitimate physical businesses. These include "free" e-mail sites,
greeting cards, search engines, information sources (newspapers,
magazines, etc.) and your favourite e-mail lists as a short but by no
means exhaustive list of candidates.
Some of what I'll discuss is not just about the Internet - it is about
the use of computers in general to track what you do, what you purchase,
where you go, etc. Some of the discussion may split off into a separate
article but for now, here it is.
It is even more appropriate to talk of this subject now since as of
January 1, 2004, Canada has a new privacy law that applies to the
subjects we're discussing.
Internet Marketing 101
The first thing to understand about the world in general and the
Internet in particular is TANSTAAFL, an acronym  made famous by Robert
A. Heinlein in his book "The Moon is a Harsh Mistress." (page 129 in my
pocketbook version.) In the words of his character, Mannie, "Oh,
'tanstaafl.' Means 'there ain't no such thing as a free lunch'. And
isn't," ...pointing to a  FREE LUNCH sign across the room, "or these
drinks would cost half as much. Was reminding (her) that anything free
costs twice as much in long run or turns out to be worthless."
In the pre-Internet/pre-computer world most of us figured out how the
marketing droids manipulate us into telling them about ourselves so they
can barrage us with advertising meant to part us from our hard-won
dollars. We know that if we fill in that "free draw" card at our local
supermarket we're likely to get an offer from the local fitness center
or vacuum salesman, probably by phone and probably at dinner time; but
we fill it in anyway because there's a chance we might win and we can
always tell the phone-droid to "f$%&-off." Of course they can also just
send us "junk mail" to the address we've handily given them because they
know we wouldn't lie or we couldn't collect the prize if we won.
Over the past ten or so years this (fill in the free offer card) style
of getting information about you has been extended to, and in many ways
perfected, using computers and the Internet. Today most people don't
even know that they are leaving valuable information behind in their
journey through Cyberspace.
Purchasing Habits for Sale
The massive growth in the capabilities of computers and their storage
systems has meant that records of every single purchase transaction
you've made using something that identifies you can be (and has been)
tracked. It started with the credit card companies and the big chain
stores with their automated cash register systems. Prior to the
automation, the transactions were only tracked for cash audit purposes
using the "audit" tape (second roll in the cash register, kept for the
tax and corporate auditors so they could track fraud and theft) so were
not easily analyzed for anything but the totals and tax. Even at the
beginning of the credit card revolution, the use of the "flimsy" card
slip meant difficulty in after-the-fact purchase analysis other than
dollar amounts vs. month, or at best week, since the retailer deposit
and card-issuer data entry cycle was up to 10 days.
Today however, you pass the clerk your card and in many cases either
they scan it solely with the store's cash register, which is hooked
directly to the credit card company, or they scan it twice - once for
their own records and once to actually deal with the money transaction
(watch out if they scan it three times - the extra may be for fraud).
You don't really think they need your card number in their system for
security purposes do you? Of course not - the card company indemnifies
them as soon as the card is validated online and they don't even need
your signature anymore the way the systems are set up (did you sign the
last gasoline purchase made at the pay-at-the-pump outlet?) Matched with
the record of SKUs (stock keeping units - the number on the item - the
bar code number, etc.) these make an incredibly informative record of
what you and the rest of their customers purchase.
Now admittedly, most of the credit card companies don't like them
tracking your name from your credit card number, but just the fact that
they know that 4503....... comes in each month and spends an average of
$100 in the tool department is useful. The major department stores that
run their own credit cards don't even have to worry about tying the
number to a name (and address, phone number, etc.) since you gave them
that and the right to use it when you signed up for the card. Gee, how
did they know I'm a tool junkie - they're always sending me flyers for
their next tool sale?
For those stores that don't run their own credit cards (and even for
those that do since many of them will accept other cards as well and
they want to track Everything!) the "affinity card" was invented. It
started out with those little "stamp" cards you'd get from a retailer
every time you purchased a pound of coffee or some other commodity. You
kept coming back so you'd eventually get your "free" pound.
It progressed to things like the "Air Miles" (www.airmiles.ca) card
which the retailers who couldn't afford to run their own credit cards
buy into in return for accurate purchasing statistics on the customers
who use such a card. We get "free" air miles we can use to go for a
holiday - eventually.
With the increasing use of standardized computers and networking in
stores, even small stores and chains could afford to add their own
affinity program - starting with the food stores and working out to all
the rest of the commodities. It has gotten to the point where
personally, I get a backache from the size of my wallet due to the
number of such cards I'm expected to carry. I'm pushing back but that is
for another section.
Browsing/Viewing Habits for Sale
The same things done in the retail trade apply in spades in the world of
the Web. Not only do the e-commerce vendors know what you bought (or
though about buying), they know which pages you visited, how long you
were there, and what advertising and other stuff you had in front of you
prior to your choice. It's kind of like the local food store having a
GPS system on your shopping cart hooked to a TV camera that watches you
as you shop - and tracking your progress through the store. Note that
you might in fact have been subject to such a survey unobtrusively as
someone watched you either in person or over closed circuit TV. If
matched to your credit card or affinity card information at the
checkout, they would even know who you were. Most stores don't do this
very often because it costs quite a bit - but web sites keep the
information as a matter of course since it is generated as part of the
process of handing you the pages you view!
  host213-122-57-44.in-addr.btopenworld.com - - [28/Dec/2003:12:44:24
          -0800] "GET /icons/camoglaze.jpg HTTP/1.1" 200 1443
"http://www.mystae.com/reflections/vietnam/proudmary2.html" "Mozilla/4.0
                 (compatible; MSIE 6.0; Windows NT 5.1;
        )" www.mystae.com
                                    
hsdbrg64-110-224-169.sasknet.sk.ca - - [28/Dec/2003:12:44:26 -0800] "GET
    /restricted/streams/scripts/machine.html HTTP/1.1" 200 24433 "-"
"Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; .NET CLR 1.0.3705)"
                             www.mystae.com
                                    
hsdbrg64-110-224-169.sasknet.sk.ca - - [28/Dec/2003:12:44:26 -0800] "GET
/icons/bluebg.jpg HTTP/1.1" 200 4088 "-" "Mozilla/4.0 (compatible; MSIE
        6.0; Windows NT 5.1; .NET CLR 1.0.3705)" www.mystae.com
                                    
hsdbrg64-110-224-169.sasknet.sk.ca - - [28/Dec/2003:12:44:26 -0800] "GET
/icons/hr.jpg HTTP/1.1" 200 2542 "-" "Mozilla/4.0 (compatible; MSIE 6.0;
           Windows NT 5.1; .NET CLR 1.0.3705)" www.mystae.com
                                    
hsdbrg64-110-224-169.sasknet.sk.ca - - [28/Dec/2003:12:44:26 -0800] "GET
/icons/zulubg.jpg HTTP/1.1" 200 3393 "-" "Mozilla/4.0 (compatible; MSIE
        6.0; Windows NT 5.1; .NET CLR 1.0.3705)" www.mystae.com
                                    
hsdbrg64-110-224-169.sasknet.sk.ca - - [28/Dec/2003:12:44:26 -0800] "GET
/icons/amazon7.gif HTTP/1.1" 200 2443 "-" "Mozilla/4.0 (compatible; MSIE
        6.0; Windows NT 5.1; .NET CLR 1.0.3705)" www.mystae.com
                                    
hsdbrg64-110-224-169.sasknet.sk.ca - - [28/Dec/2003:12:44:26 -0800] "GET
 /icons/yline.gif HTTP/1.1" 200 419 "-" "Mozilla/4.0 (compatible; MSIE
        6.0; Windows NT 5.1; .NET CLR 1.0.3705)" www.mystae.com
                                    
     Section of the log from our web server generated as I write this.
  Shows the address of the requestor, what they asked for, what browser
 they're using and what operating system even, as well as time and date
The logs can even track what site you visited before you come to the one
you're viewing. This can include what search criteria you used at your
favourite search engine. All of this can be analyzed and served up as
statistics in aggregate or even individual by individual (although
that's not typical on a busy site - just too much detail). We do this
for David's own site www.centa.com so that we can judge what are the
"hot" topics as time goes by. Of course we don't know who you are unless
you've actually subscribed to the mail-list.
                          Search Query Report
 (Go To: Top: General Summary: Yearly Report: Quarterly Report: Monthly
  Report: Weekly Report: Daily Report: Daily Summary: Hourly Summary:
   Domain Report: Organisation Report: Host Report: Host Redirection
 Report: Host Failure Report: User Report: User Failure Report: Failed
 Referrer Report: Referrer Report: Referring Site Report: Search Query
 Report: Search Word Report: Browser Report: Browser Summary: Operating
 System Report: Status Code Report: File Size Report: File Type Report:
 Directory Report: Redirection Report: Failure Report: Request Report) 
 This report lists which queries people used in search engines to find
                               the site. 
                                    
                                    
          Listing queries, sorted by the number of requests. 
                           reqs: search term
                           ----: -----------
                       3: income tax immigration
                         2: canadian tax rates
             2: immigration department of sydney to canada
                      2: revenue canada race horse
           2: canadians working in usa social security taxes
      2: canadian citizen living in us need to pay tax in canada??
                     2: americans living in canada
                       2: canadian tax us rental
                                    
              This analysis was produced by analog 5.32. 
                        Running time: 1 second. 
                                    
   A piece of a daily report - note that only the top 10 are shown. 
 There are actually several hundred such phrases in all on this report.
                                    
h24-80-116-254.sbm.shawcable.net - - [27/Dec/2003:09:13:43 -0800] "GET /
                          HTTP/1.1" 200 41273
"http://www.google.ca/search?hl=en&ie=UTF-8&oe=UTF-8&q=income+tax+immigration&btnG=Google+Search&meta=" "Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.5) Gecko/20030925" www.centa.com
                                    
A log line showing the key words used in searching - in this case using
                                Google.
   The portion showing the site the request came from is the "referrer"
                                                section
As you can see in the box above, lots of interesting things can be read
from the logs - and as you can see - even on the old AMD 850 this site
(along with several hundred more, some of which are MUCH larger) is
hosted on only took less than a second to produce the report - which
runs to about 129k of text plus graphs for this one day - you're only
seeing one piece of one section. The same report is done as a monthly
and yearly aggregate too. We don't track individual users' path through
the site and we use "Open Source" log analysis software so the report is
pretty basic. You can bet that the major sites collect far more data and
do a far better job of analyzing it.
Note that even after this analysis is done, the original log lines are
still available for further analysis if needed. The lines for this year
for the CEN-TA site total to about 44 Megabytes of compressed files.
Even our largest site which gets over a million file views a day runs to
only about 12 Gigabytes for the year. With disk space at about $1/Gig
these days, storing them online is trivial.
The point is that the technology to track literally everything you do
when sitting in front of your computer and interacting with it and the
Internet's Web is available, and not all that expensive. Even at the
best, you leave tracks in various computers as you browse; mostly
"anonymous" but valuable none the less.
Taking Away the Mask of Anonymity
What David first asked me about - whether or not I'd seen a picture from
the web page he'd sent me - is all about unmasking your anonymity. Much
of what I've detailed in the previous section can only tell what
computer address you were at when you looked at the pages. For most
people this changes each day or so, so there is no real correlation to a
person (I have a fixed IP address which adds spice to the problem as
I'll tell you about below.) 
In some cases this unmasking is subtle. In others it is blatant. In
Canada after January 1, 2004 it had better be "by the book" or somebody
could be in trouble; at least somebody other than you, the page viewer.
Of course my opinion is that  you're potentially in trouble no matter
what you do.
I don't mean to sound completely paranoid, I'm not. On the other hand,
maybe I (and you) should be. The number of incidents of identity theft
and fraud is growing. So too is the number of online scams, spam
e-mails, bogus web sites and what have you. They're not yet at the point
where I'd call them a real epidemic - at least not for people who know
there is no Easter Bunny, Santa Clause, 80% return on investment in a
year or $200,000 bonus for getting "my" millions out of Uganda or
wherever; in other words for people who have even a modicum of
skepticism and common sense. All that is needed is a bit of education on
what to watch out for - the subject of this article.
Web bugs
The original reason David asked me to write this article is an example
of a "web bug" - a unique URL that is embedded in a message sent to you
in some fashion that, when you view the message, confirms that you have
done so.
The page David sent me (or caused the web site to send me as if it were
from David) was done up in HTML and included a couple of unique image
URLs, one of which ended with 
"__tn_pers2790347040.jpg?BCmegAABvemnfj9H"
If my browser had been set as most of yours is set, the first time this
message appeared in my preview pane or was opened by me, the image would
have been loaded from the sending website - leaving behind a log record
including the full URL. Note that after the image's name
(__tn_pers2790347040.jpg) there is a trailing "?" and something
(BCmegAABvemnfj9H) that appears to be garbage characters. In fact, the
garbage is a unique key to a record in a database that includes the fact
that the page was mailed to both me and David, including the time it was
sent, and probably linking to all the things that David had done in the
session leading up to his sending it.
In this case the bug was attached to a "real" picture. In some cases it
is as little as a single pixel (picture element - dot on the screen) so
loads "instantly" and doesn't show you anything - but it's log record
exists in the server none the less.
Freaky, eh?
And you thought you'd turned off "acknowledge reply request" (which
causes an automatic reply e-mail to be sent which tells the original
sender that you've read their message, but which some mail agents don't
support well and most people outside of specific companies refuse to
have turned on for privacy reasons if for no other reason than to deter
the spammers)
We know you've seen our mail!
And in some cases (Windows specifically) because it is actually the main
browser engine that interprets the HTML and retrieves the graphic, the
sending site has the opportunity to send your computer a "cookie" that
continues to identify you if you should again visit the site with your
normal browser, even months in the future.
Cookies
When you're just web browsing, one of the ways a web site tracks you as
distinct from some other viewer, for a few minutes or forever, is by
sending your web browser a unique series of characters (somewhat like
the web bug above) that your browser stores for some time, possibly
permanently. This "cookie" concept is valuable to you the viewer in some
cases - such as when you're working with a web site you've had to log
onto with a user ID and password. If it were not for cookies, the
otherwise simplistic design of the Hypertext Transport Protocol would
mean you would have to re-log on for each page you wanted to view on the
site - not something most would put up with. 
The problem is that this viewer-helping web extension also can help the
web site keep track of you and your travels through the site (or even
across sites).
Unless you have told your web browser not to store cookies (see Pushing
Back below) a web site can deposit a cookie on your computer and later
check to see if it is there. The cookie can contain either direct data
or a key (like the one above on the image tag) that can be used to pull
a record from a database and add more detail to it. At minimum, the
cookie can be used to track which pages you've visited, in what order
and for how long during the current viewing session with the site. In
extreme cases, the cookie can allow the system to track your use of any
web site that uses a common information database (and there are many
such agglomerated site systems) and tie the information into answers you
might give to seemingly innocuous "surveys" and questionnaires (see
Verifications below) as well as purchases - eventually building up a
wealth of data on your personal and financial life. In some cases enough
is learned that the web site can tie their information to your credit
record (even if you don't give them a credit card number or your
SIN/SSN.) 
One thing to note with this and many of the other methods used by
legitimate companies to collect information on you; it is not looked at
personally by anyone except in very extreme cases. The data is massaged
and manipulated by programs which today bear a striking resemblance to
Artificial Intelligence - with the goal of presenting you with
advertising and offers as well as information that the system thinks is
most likely to keep you coming back and hopefully to get you to part
with some of your hard-earned cash - sell you things and services.
Verifications
I subscribe to a number of "free" magazines. Even though I've been
around computers and the Internet for longer than most people my age, I
still like to read from paper - a habit I'm working on breaking by
adding screen real estate to my system, but which seems to be a losing
battle as my eyesight deteriorates with age. For the techies out there,
I run my main system with two 19" monitors, each running at 1600x1400 -
problem is I have the font sizes cranked up to the point where I might
just as well be running them at 800x600 when I'm actually reading.
Anyway, back to the free magazines. Each year or so, each of the
magazines sends me a special issue wrapped in a verification
questionnaire. Prior to the Internet, I'd fill these in and either
snail-mail them back or fax them back. Today however, all of them have
fill-in web forms for this purpose; should be easier, right?
Well, yes it is easier. The problem is that the magazines get their
advertising dollars based upon audited subscription statistics so they
can't just print up thousands of copies and send them out to random
people; they have to know that you "qualify" and are a real person. With
the forms they send, there is a spot for a signature. Unfortunately,
there is no way of signing a web fill-in form (at least not one they
will accept) so the auditors (or the magazines' programmers maybe) came
up with the concept of a "verification question" - something that is of
a relatively personal nature that a random person probably would not
know about you - kind of like asking your mother's maiden name when
talking to the government about your passport or driver's license. (I
have issues with this too but that's for another time)
The problem is that it seems that many/most of the magazines I get
either have the same software for their questionnaires or use the same
service provider to manage their subscriptions. Some of them even send
me to the same web site but different sub-directory, although most have
something under their own web name.
The curious thing is that all of these magazines have a similar set of
questions they ask for "verification purposes". The questions seem to
change every time I renew for a particular magazine but over all of them
the questions in total remain fairly static:
      * colour of your hair?
      * birth city
      * colour of eyes
      * favourite colour
      * favourite pet's name
      * month of birth
      * day of birth
      * year of birth
      * colour of vehicle
      * etc. etc. etc.
Notice anything? Each of the questions in itself doesn't give any
particularly private information, but all of them in total do - and
these are just a sampling of the ones I get. I know for a fact that at
least 5 of the magazines I get are from the same publisher - they cross
advertise and the web site is the same for the renewals; yet each asks a
different question each year so the total of the information they can
gather is large.
Of course I caught onto this years ago and have instituted my own
"Privacy Policy" which I'll tell you about below. In general I have a
set of answers that I use consistently but which are not even close to
the "truth".
Surveys, Questionnaires and Stealth Questions
Several of the web sites I visit regularly have "informal polls",
questionnaires, and other information gathering means. The magazine
sites in the previous section all ask information about the kinds of
business I do, including dollar volumes, projections, etc. In their
case, this is to allow them to decide if I "qualify" as someone they
want to send their "free" magazine to. At least the magazine publishers
are fairly up front about it; other sites are not.
If you do any major browsing on the Web I'm sure you've come across
sites that ask you questions in order to gain access to some of their
areas. The questions can include personal information, even if cloaked
as a range of values (Age: 18-25, 26-35, ...) but over time the accuracy
of the data can be alarmingly precise. If you are asked the same
question but with slightly different ranges the computer can narrow down
the exact answer by detecting when you move from one range to another;
(18-25, 19-30, 24-36, 26-35 - if you are 25 you'll end up in the first,
second, third but not fourth)
The fact that you choose a particular button to go to the next page can
be informative; [English] [French] being one of the most common in
Canada. In fact, your choice of click-through advertising is probably
kept along with the rest of your profile. Did you click on the ad for
music videos or tools? The next time you're presented with a couple of
ads they may be specifically placed to determine your preference in tool
or music artist, depending upon which you chose first.
You should also know that the same things apply to the information you
fill into the software registration forms on your computer when you add
something new. You're asked similar things each time you get an upgrade
in some cases and of course when the inevitable happens and you have to
re-install everything again. 
Against all of these techniques, what can you do? You want to use the
services, and in many cases don't mind that they are going to try to
sell you things. You just don't want to give away enough that "they" can
be more than minorly annoying if you can possibly help it.
On the other hand, you also don't want to get caught by the criminal
side of the computer revolution either. Information you might actually
be comfortable with giving to a company you know and trust might be just
the thing an identity thief needs to get a new credit card issued with
your name on it.
Somewhere you and the businesses and sites you deal with have to strike
a balance that both can be comfortable with. The problem is that the
guys at the other end of your Internet connection have all the tools and
databases.
Pushing Back
If you don't push back against those who want to know more about you all
the time, you'll end up as transparent to them as if they lived with
you. This is not a joke!
The first thing to do is decide whether you need or want to bother
worrying about all this data out there on you. Some people actually like
the fact that when they go to their favourite news site it shows them
the baseball scores first and never shows them news about foreign
countries at all. In this case you have "paid" for your "free lunch" and
are happy about it. 
This may be fine for one or two sites. It even may be fine for all the
sites you normally visit - but you should still be on guard whenever you
visit a new site or get sent something by a "friend" to try or see. You
should also be aware that not all your "friends" may appreciate your
giving their e-mail addresses out to your favourite site so you can send
them something interesting (as David did in the case that sparked this
article) You have to learn to practice safe Internetting at least enough
to not annoy others you deal with.
On the other hand, if you are uncomfortable with "them" knowing all
about you, including your underwear size, eye prescriptions, age,
occupation, sex, address, place of birth, etc. then you need to do more
than just be watchful.
The major thing to recognize is that, as noted above, most of the time
your information is dealt with only by computer programs - and computer
programs are still not truly "intelligent". Today's "data mining"
techniques look for statistical patterns within numbers of records. They
look for viewing or purchasing patterns with enough people following
them that it makes sense to craft a marketing strategy that matches the
pattern and take advantage of it. To do this they apply mathematics
that, amongst other things, throws out "bad" or inconsistent data.
Hmmm... maybe there's a way to get our records thrown out - or at least
confuse them as to which patterns we really fall into.
To do this we must inject some randomness and/or misleading data into
our travels. Not enough that we can't get the services we want, and
certainly not enough that we fall afoul of fraud laws or such. Just
enough to maintain at least a bit of a curtain of privacy and cast
uncertainty on the data.
This can be done in non-Internet activities as well. I have several
credit cards but use them in a fairly random fashion. Some months I'll
use one for gas and another for miscellaneous purchases and not use
another one at all - even for months at a stretch. Same thing with the
mix of credit and debit card use. I also use cash in many situations
even though I could (and sometimes do) use credit in the same situation.
Thus, there are holes in "their" data - no obvious patterns in general.
The same things can be done when giving information to Internet (and
software) companies.
Many of these practices are "passive" push-backs. I also actively push
back in some cases by letting the organization know my views on their
"policies" and letting them know my own policies if necessary and why I
have them. The rest of this section deals with some of the details of
this pushing back.
Affinity Cards
A good friend of mine makes his money solely as a computer security
expert. He's paranoid - a good thing in his industry. One of the things
he has found out is that some stores will actually allow you to register
anonymously for an affinity card. No personal information on record, but
you get the discount and the store can track that "anonymous cardholder
12345... has this purchasing habit" which seems fine with them. So far
he's received such cards from a couple of food chain stores and a book
chain.
A suggestion he has made to me that I have yet to do anything about is
that people register in some fashion to get a card then drop them into a
box at the door for later use by anyone else who needs one. In some
stores the cardholder earns "instant" rebates over time and the random
cards might act almost as a lottery. I'm not sure how the stores would
like it but it's a thought.
On the other hand, I have noted above that I actually get a sore back
(from the thickness of my wallet - carried in a back pocket and causing
me to sit funny in my car - requires a "walletectomy" every few months)
if I carry all the cards the various stores want me to use. It used to
be that other than the credit cards, I only needed my "Air Miles" card
since it crossed many stores. The problem is that for whatever reason,
many stores are no longer part of this umbrella and instead run their
own card.
My push back to them is to ask if just having the number is enough - in
which case I'll enter it into my cell phone or PDA, both of which I have
with me at all times anyway. This has worked fairly well for some
stores. A couple didn't like the idea and I've run across individual
clerks who don't quite understand, but that's their problem and I let
them know it.
On the other hand, there are a number of shops I won't deal with any
more than I absolutely have to because they require that I present the
whole card, and in one case the card itself is thicker than most credit
cards are. The manager there just didn't understand when I told him why
I wouldn't be back until they changed the policy. The store offers quite
a healthy discount for cardholders but their competition does the same
and only requires the number.
Other stores are getting the message and creating cards that are very
thin, and in once case 1/4 the size of a credit card and designed to
hang on your keychain. The push back seems to be working.
Places that use the old "stamp" card (card of empty squares stamped each
time you purchase something) will mostly keep the card in their store
for you. If they don't, I tell them why I won't be back. 
E-mail Software Solutions
The original subject of this discussion is an e-mail sent to me by
David. If you don't want the sender or other nefarious web site to know
the fact that you've received (and opened) any particular e-mail, you
may have to change your software. At minimum you'll have to get into its
options and change how it deals with external links from HTML mail.
    I'll first of all say that I don't use Windows for my day to day
Internet access. I have a Linux box in front of me, the details of which
  are on my home-office page. About the only thing different from the
 picture at the moment is the second monitor I mentioned above - beside
the one you can seen in the center of the main picture. As you'll note I
also have both a separate machine with Windows 2000 on it and a session
 of Windows 2000 running in a "cage" (VmWare) on my Linux box, so I do
have access to the facilities if I can't do things any other way. I'm in
 fact writing this article using FrontPage 2002 in Windows under VmWare
                          on the main machine.
                                    
My E-mail program is Evolution - a Linux-based Outlook look-alike. I've
used Outlook in the past as well as Eudora and many other Windows based
 programs, but I no longer do so, so am a bit rusty on their setup and
                              daily use. 
The things I've found out indicate that versions of Outlook older than
2002 and all versions of Outlook Express up to very recently cannot be
told not to load images from the outside when e-mail is shown in the
preview pane or opened up. Outlook 2002 can be set this way (see link
below) and Outlook 2003 comes with this feature set on (don't load
external links). Personally I like Evolution's way of doing it at this
point - load external links only if the From: address is in my Contacts
folder; although the fact that Yahoo spoofed this is disconcerting. I
may suggest to the team that is doing the Evolution programming that it
also take a look at the Return-path: address (which in this case showed
nobody @ Yahoo-inc.com)
If you can't update to a newer Outlook you might want to get
Mozilla/Netscape and use It's mail reader instead. Many people like it
and there are new features coming all the time. Blocking images is a
selection on the "Privacy & Security" menu under "images" where you can
select specific sites you'll allow images from or turn their download
off completely. Again, no selection for only allowing them in mail from
people you know. I use Mozilla 1.5 as my main browser on both Windows
and Linux - works fine for most sites now.
If nothing here applies to your situation; you can't change (company
policy or financial reasons) or simply don't want to, you should at
least understand that you are letting the other end know that their
message was received. If you don't like it - push back by telling your
vendor and/or company MIS/IP people.
E-mail Source Code Discovery
You can see the "nasty" URLs in e-mail you've received by setting your
program to "show e-mail source" and looking for the "img" (upper or
lower case) tags. The following one is from my Christmas Greeting, sent
out with the pictures included in the e-mail as attachments. This type
of IMG is just fine - the whole thing is included in the e-mail and no
external reference is needed to view it. The "cid:" portion of the tag
string means it is referencing an internal (to the e-mail message)
attachment.
<IMG SRC="cid:[email protected]" ALIGN="bottom"
                                        ALT="" BORDER="5">
The following HTML IMG tag came from David's e-mail to me (slightly
obfuscated). Note that the tag in this one contains a full URL to an
image file, plus the extra ? and database key.
      <img src="http://us.f1.yahoofs.com/ xxx/ 3f808b6z_c5e5/ bc/
     Yahoo!+Photo+Album /__tn_pers27903z7040.jpg ?BCmegAABvemnfj9H"
                  width="61" height="90" border="0"/>
In most of the e-mail programs in use today, receiving this e-mail would
tell Yahoo that you existed, and they already know your e-mail address
since your friend gave it to them.
  "Yahoo!'s practice is to include web beacons in HTML-formatted email
 messages (messages that include graphics) that Yahoo!, or its agents,
sends in order to determine which email messages were opened and to note
 whether a message was acted upon." abstract fromYahoo's privacy pages.
So, through no fault of my own, Yahoo now knows that my e-mail address
exists and I've seen a picture from their site. Their policy states that
they collect personal information "when you visit Yahoo! pages..." which
now I have done. Now they seem to think they have implicit permission to
pass my e-mail address around their company and associated companies,
business partners and other companies. But I didn't knowingly visit
their page - I only viewed an e-mail I thought had come from a friend of
mine!
Greeting Cards Too
The same thing happens when a friend of yours sends you some electronic
greeting cards - you know, the ones that they can have sent out to their
whole mailing list on major holidays and to individuals on birthdays and
anniversaries. I even sent out a special missive to my own Christmas
list this year imploring them not to follow this practice as I would not
likely see their card since my system is set not to download the
external links.
The point with this and the previous section is that regardless of
whether you have decided you don't care about your personal information,
decisions you make can affect others you count as friends or associates.
I'm not talking about a virus using your contact list to send itself -
that you may not have been able to stop, although I can make a case
there too. 
I'm talking about your use of "free" services that you put information
of any kind into that ends up with the service discovering information
about your friends and associates despite the fact that they have not
been given the opportunity to say no.
Browser Software Solutions
To minimize sites tracking you, you can limit your browser's cookie
storage abilities. Interestingly enough, most browsers today allow far
more flexibility in these settings than your e-mail programs allow in
theirs.
In general, there are two types of cookies - those that last only for a
"session" - meaning until you close your browser window (and any clones
you have of it) or until you reboot your computer - and those that last
between sessions.
In addition there are "first party" cookies and "third party" (you, the
viewer being the missing "second" party). Some web sites (and Yahoo says
they do this) may set a cookie for one of their advertisers which comes
from a completely different web site. This is a third party cookie.
First party cookies are from the site you think you're viewing. Some
people turn off third party cookies and leave first ones on. Others only
allow session cookies.
Some browsers allow you to treat session cookies separately from others.
Some don't. Some don't tell you what they're actually doing (MS IE is
one unless you go into the "advanced" settings) so you may have to dig a
bit on your favourite search engine.
Even if you turn off cookies other than session cookies, some browsers
allow you to add a list of sites you'll accept them from in any case.
This allows you for instance to allow Google or Yahoo to recognize you
when you come back (and track your travels through their pages) but not
allow 3rd party cookies (unless Yahoo sets one for Google) - the best of
both privacy and utility worlds but sometimes a pain to administer. 
On the other hand, nobody said that "Free" didn't come with some pain
did they?
Government Privacy Legislation
The "Personal Information Protection and Electronic Documents (PIPED)
Act" goes into full effect on January 1, 2004. It has actually been
around for a couple of years now, and even now will not be enforced
harshly. See the link below to the Canadian Privacy Commissioner's web
site for more detailed information.
                    Abstract from "Your Privacy Responsibilities"
                                    
                            The Act in Brief
                                    
  Organizations covered by the Act must obtain an individual's consent
      when they collect, use or disclose the individual's personal
 information. The individual has a right to access personal information
   held by an organization and to challenge its accuracy, if need be.
Personal information can only be used for the purposes for which it was
 collected. If an organization is going to use it for another purpose,
consent must be obtained again. Individuals should also be assured that
 their information will be protected by specific safeguards, including
  measures such as locked cabinets, computer passwords or encryption. 
                                    
                                    
                                    
                          Personal information
                                    
  Personal information includes any factual or subjective information,
    recorded or not, about an identifiable individual. This includes
                   information in any form, such as: 
                                    
                                    
                           * age, name, ID numbers,
                           income, ethnic origin, or
                                  blood type 
                                    
                           * opinions, evaluations,
                          comments, social status, or
                             disciplinary actions 
                                    
                           * employee files, credit
                             records, loan records,
                           medical records, existence
                             of a dispute between a
                            consumer and a merchant,
                          intentions (for example, to
                           acquire goods or services,
                                or change jobs) 
                                    
Personal information does not include the name, title, business address
         or telephone number of an employee of an organization.
I am not a lawyer (IANAL) but, having my e-mail address, I expect Yahoo
could find a lot out about me because I have had the same address for
quite some time, it is my own domain (not Hotmail or Yahoo) and the main
page for the website for the domain has my address on it along with my
name. The fact that they can do this does not mean they have my
permission, since I did not actively give my consent to them - but there
are some loopholes they can use (or drive a bus through) and of course
they (Yahoo) are in the US so all bets are off. 
Personal Privacy Policy Creation
OK, so we've seen all the various ways we can be tracked, with and
without our knowledge and/or consent; and these are just the ones that
legitimate business uses. Some of the ones the really bad guys use would
curl your toes - but that too is for another day.
The question is, what can we as individuals do about this? My solution
is really a goal and a number of stop-gap measures along the way.
The goal is to get the collectors of information to be completely
forthright about everything they do with the information they collect
from me and allow me to say when enough is enough, in real time, and
make it stick. I also want them to realize that their need to track my
purchase/browsing habits does not mean that I should endure pain of any
kind - physical, mental or economic; I'll bow to them needing a number
when I talk to their sales staff if they'll bow to the fact that they
are not alone in my wallet.
The new privacy legislation is supposed to give me some of this power
but I really don't think it goes far enough. On the other hand, at least
it's a start.
Having the goal, the rest comes down to pushing back in various ways.
The first is to recognize that many "company policies" have no basis in
law, reality or even common sense - they just exist. Some exist from
times past when things were done differently. Some were created by
idiots. Some were created for a good reason but just don't work, and
some are simply there to take as much advantage of you, the
consumer/viewer as the company possibly can.
Well, as a consumer and viewer - you can have a policy too - and there's
no reason why some of the items on it can't be just as crazy as theirs
if you want. Once you create yours, you might just want to print it out
on some really nice paper and carry it with you so you can show it to
intractable clerks and managers.
Some of the things I have in my Personal Privacy Policy
      * Give as little information
        as possible
      * Obfuscate what I do give in
        some manner
      * Randomness is my friend - be
        a 99th percentile -
        sometimes
      * Let them know you know what
        they are doing
      * Let them know that you care
        about your privacy
      * Let them know that if they
        are good, you'll continue to
        give them your custom - and
        be firm in your resolve if
        they don't cooperate.
      * Never do their work for them
        for free
      * Ask to see my record (after
        January 1) - not often, and
        not always from the same
        company, but just to keep
        somebody on their toes -
        same thing applies to your
        credit record too by the way
      * Don't let my physical
        identification out of my
        sight - credit cards, debit
        cards, driver's license,
        passport, affinity cards -
        anything
      * Go up the food chain as high
        as necessary
Give as little information as possible
When faced with a fill-in form, fill in only enough blanks to get past
the entry checking - mostly they are noted with an * or something. If
doing things in person, ask why they need certain information. One
favourite of mine is my SIN. In Canada, the law actually is that nobody
but those who are remitting tax information about you to the Federal
government may ask for your Social Insurance Number. This means your
employer (withholding tax) and your bank (interest if you ever get any)
and maybe your stock broker but nobody else.
Ever tried filling in a credit application and leaving it blank? Try it
some time - interesting experience. Of course the SIN is such a widely
used/abused identifier in the commercial world today that the Feds are
talking about all new identifiers.
On the other hand, many software packages I have that "require" my first
and last name have just my initials in the space. All the registrations
seem to have gone through, and here in Canada the manufacturer must
honor the warranty in any case, so I'm fine.
Obfuscate what I do give in some manner
Gee, I must have mistyped it. Close, but not quite. The address is a
digit off or the postal code is out by a letter or something. Of course
the good companies actually check that your address and postal code
match, but since the postal code denotes one side of a street of some
floors of an apartment building, you can still be out by a bit and pass
the test. Same thing with phone numbers. Gee, I gave you the fax number
as my voice - I'm terribly sorry. If they really want to get hold of me
they'll send me a fax.
The validation questions for my magazine subscriptions are another are
for obfuscation. I have a list of standard and wrong answers that I use.
If the auditor calls, they get the answer I've given so things are fine,
since I really am a live person and I really do read their magazine and
sometimes even talk to their advertisers. What more could they ask,
right?
Well, maybe my eyes aren't "pinque" and my birthdate isn't the first of
January (close - only off by a couple of days) but who cares?
Randomness is my friend - be a 99th percentile - sometimes
As noted earlier, I change the use of my credit cards fairly randomly
and sometimes use cash. Sometimes I use my affinity card, sometimes not.
Sometimes I'll use the store's affinity card and sometimes I'll use Air
Miles if they accept that.
The computers out there are looking for patterns using statistical
analysis which in its basest form most people have seen as the"bell"
curve. I actually met my wife while we were both taking the same
statistics course but that was over 23 years ago. Then I could have
given you all the equations and everything - today I'm just going to say
that the computers are looking for things near the center/average - high
point - of the curve and I want some of my data to be out at one or the
other of the ends (left end is 1 percentile and right end is 99th
percentile).
This means that if the average person goes to the same store all the
time for commodity items, I'll work at going to different ones. In this
way my purchasing habits as tracked by any one store are far less than
average so they'll ignore me.
The same thing for answers to some of the surveys I get (the magazine
ones for example) - I'll have one or two answers that are completely out
in left field compared to the others - my purchasing power is none but
my budget is huge or something. The rest would be fine and on average
I'll qualify for the subscription - but the computers won't know what to
do with the information.
Let them know you know what they are doing
This is a tough one. The average store clerk doesn't care. They're
getting fairly minimal wage and didn't write the policies. You also
can't talk to the web server itself. What you can do is ask to talk to
the manager or send feedback to whatever address you can find if
something warrants it. I've had some interesting success with both of
these actions. One book store I frequent used to have their card
scanners on a tray below the cash register and out of site of the
customer - behind a fairly high counter. They now have the card scanner
on the desk in plain view of the customer. Maybe the double swiping
scandal at our local airport had something to do with their decision,
but I'm hoping my talk to the manager had something to do with it too.
Let them know that you care about your privacy
After writing this, I intend to send a copy to Yahoo and request that
they remove my e-mail address from their files, since I have never given
them explicit permission to record it.
I just sent some feedback to the creators of a video DVD set I got for
Christmas. The set virtually forced me to install a new DVD software
package which not only set itself as my default for viewing DVDs, it
didn't even work. Worse yet, the software said it would track my viewing
and report back to its masters "anonymously" - despite the fact that I
am quite identifiable since I have a fixed IP address at my house,
unlike most people. I haven't yet heard back from them, but I'm going to
follow up on my promise to them to mail out pieces of their product
along with an explanation to some of the people I know if they don't get
back to me soon. My regular DVD software won't read the main 2 disks but
will read the "extras". Since the package is opened it's unlikely I can
get a refund so the disks are useless anyway except as a lesson to the
vendor.
On a different front, I've already mentioned that I sent my rant out to
my Christmas list which I hope will let them know that I don't want to
be included in some company's database - and of course I'm writing this
for David and you for the same reason.
"Them" includes the people you deal with who might inadvertently expose
your information as well as those who collect it. Consider that this is
part of the education that people should have received but didn't - and
you're just helping them learn.
If you absolutely must use some centralized greeting card site, or have
some web site send a note to your best friend for you, ask the potential
recipients if they mind (and maybe point them at this article if you
want) and ask the web site for exact details of what they will do with
the information you give them; how long they will keep it, if they will
send out unsolicited e-mails to your friends, if they are connected with
any other company that they will pass the information on to. If you are
satisfied with the answers, tell them so and tell your friends. If you
are not, do the same. Companies on the web exist by the instantaneous
grape-vine it is. Both good and bad news travels fast, and truly
service-oriented companies will respect and deal with their customers'
concerns. Otherwise they'll die.
Let them know that if they are good, you'll continue to give them your
custom - and be firm in your resolve if they don't cooperate.
As noted in the previous section, when you ask, tell them what you will
do if things turn out ok - and if they don't, stop dealing with them and
tell others (as well as telling them that you are doing this.) This is
the consumer equivalent of a strike or boycott in the computer age.
Don't use it for trivial matters, but know that it does work, but only
if you tell people. The one thing to keep in mind is that you are using
your opinion to guide others. You should understand the difference
between opinion and defamation. One is ok, the other is illegal
(libel/slander).
One of the two local stationary stores offers an affinity card with a
healthy discount. Prior to applying I asked my standard question,
especially in light of the fact that I could see that the card was even
thicker than a normal credit card. "Can I simply give you my number
instead of having to present your physical card?"
The answer was "no" so I asked to see the manager. I explained why this
answer was unacceptable to me (sore back from too many cards) and asked
if they would store the card at the store for me since it was the one I
came to the most and I didn't care if I didn't get a discount at other
stores in the chain. The answer again was "no" so I pulled out my wallet
and put my credit card away and told them I'd come back when their
policy changed as my policy forbid me from signing up for their card and
their competition (whose card number was in my PDA) allowed me to just
quote the number.
I have been back a couple of times since, hoping that the policy has
changed. Each time I do my shopping and bring the goods to the counter -
and end up leaving them there. Maybe they'll get the the message some
day.
Never do their work for them for free
They want the information on you for their good, not yours. Well, that's
not strictly true since being able to accurately predict purchasing
patterns does cut down on inventory expense and allow them to drop their
prices accordingly - but they usually don't until all of a particular
market segment has the same efficiencies and they all drop at once. In
the mean time, the better run companies try to put as much money away
for their investors as they can. Hey, I'm in business too and I'd do the
same thing.
On the other hand, there is only so much cooperation that buys from me. 
If you feel you are getting adequate value from a company in return for
the things they do with the information they gather from you, then fine.
I'm certainly happy with my magazines.
I'm also happy with the discount I get from the major book store I
visit, where they accept my affinity card number with no problem (but it
took a couple of years and a corporate takeover to get there)
Personally, I don't use any of the major online web Portals except
Google. I don't need any more e-mail addresses as we run our own server.
I don't need web space for the same reason. I have my own "chat" system
separate from the big guys and such. 
Most other people on the other hand don't have the resources of an
Internet service provider at their beck and call. You all have to
balance the amount of privacy invasion you'll accept with the cost of
replacing the services you get for "Free" from your particular favourite
portal.
It's all a balance - and now that you know what is on their side, you
can decide whether it is worth what you have on your side.
Ask to see my record (after January 1) - not often, and not always from
the same company, but just to keep somebody on their toes - same thing
applies to your credit record too by the way
In Canada, every person with a credit history has the right to ask for a
copy of it each year from each credit reporting agency. When was the
last time you asked for yours?
As of January 1, 2004, you'll be able to ask for similar information
from Canadian companies who you deal with in any way and who you even
suspect of having personal information on you. If you read the "Your
Privacy Responsibilities" guide that the abstract above was taken from,
you'll see that it shows what a company should do for you. It was
written from the point of view of the business, but turning it around
and using it as a guide for what you can (and should) do is fairly
straight forward.
Don't let my physical identification out of my sight - credit cards,
debit cards, driver's license, passport, affinity cards - anything
The stores, the government, everyone it seems needs to see some sort of
identification from you if you visit them or pass through their
jurisdiction. Of course you can always just not travel and pay for
everything with cash only, but then that's giving in to them and who
wants to lead that kind of a life?
As noted above I've already been instrumental in getting one store to
change where they put their card scanners. I've also been very adamant
to store clerks and even managers if they try to break my policy.
Government officials are a slightly different story, but they get the
lecture anyway and then I give in. Airport security guards can do
whatever they please - but I take notes.
This extends to getting replacement cards too. We have had a lot of mail
theft in the Vancouver area and the target is exactly what I'm talking
about - identity items that the thieves can use to ruin your credit
reputation. Have the cards sent to your local bank branch and pick them
up in person.
Go up the food chain as high as necessary
If you feel strongly about some particular injustice you see or a policy
that seems just plane wrong, tell it to the top if necessary. There is a
show on TV lately that depicts upper management going down to the
front-line positions for a day or two to get a feel for what is going on
in the trenches. Many executives have no idea that there is a problem
unless you follow up. Some of them don't care but many do. If you help
them to understand a problem, don't just rant at them but truly get them
to understand your point of view, many will do something about it.
I recently had a call from a bank executive because I'd pointed out to
the branch employee that their privacy policy he wanted me to sign was
at odds with their advertised policies and I'd made a note on the form
to that effect. The form is being changed.
Amaze yourself with what you can accomplish, and keep your privacy in
mind whenever you deal with anything computerized.
Interesting Links
      * http://www.georgedillon.com/web/html_email_is_evil_still.shtml URL says it all - HTML e-mail is evil
      * http://www.microsoft.com/uk/technet/fyi/issue6/spam_email.asp Even Microsoft admits that there are problems - but they have "fixed" the problem in Outlook 2003 by setting not to download images by default (finally)
      * http://support.microsoft.com/default.aspx?scid=kb;en-us;Q307594 and here is how to do it in Outlook 2002 - problem is, I don't see any such option in older versions. Of course this type of change is fairly drastic if you sometimes want to see HTML.
      * http://www.extremetech.com/article2/0,3973,716787,00.asp A review of the software I use - Ximian's Evolution 1.2
      * http://www.flzone.net/ShowDetail.asp?NewsId=6024 notes about updates to Outlook Express (finally) to turn off attachment execution and image downloads when viewing HTML mail
      * http://mactips.info/tips/index.php/2003/02/26/p253 tip for MAC users of Eudora (may also apply to PC/Windows) to turn off image downloading
      * http://privacy.yahoo.com/privacy/us/pers/ Yahoo's personal privacy statement - many other companies have similar ones. Note that they talk about cookies and "web beacons&quo	    

Trackback

Trackback URL for this entry: http://www.centa.com/trackback.php/UsCaWeekofMon20031229000595.html

No trackback comments for this entry.

0 comments