NEGATIVE-PRIVACY-SOLVENCY-GENERAL 110

PRIVACY IS UNDER ATTACK FROM SO MANY SIDES IT CANNOT SURVIVE

PRIVACY IS A BUCKET WITH HOLES -- YOU CAN'T PLUG IT

Laura Berman, The Detroit News, December 21, 1999, SECTION: Metro; Pg. D1 TITLE: Privacy a major casualty in this new high-tech dot.com world // acs-EE2001

Truthfully, we don't know what they know. Privacy is a bucket with holes.

PRIVACY GETS SLICED AND DICED FROM ALL SIDES UNTIL IT IS GONE

BOB TRIGAUX, St. Petersburg Times, February 07, 1999, SECTION: BUSINESS; COLUMN; Pg. 1H TITLE: Consumers wake up to privacy intrusions // acs-EE2001

Privacy ain't what it used to be.

Now come the latest privacy assaults. Your face, your spending habits, your Internet wanderings, even your genes are targets to be captured and stored in giant corporate data bases designed - what else? - to make money.

In Florida-speak, privacy's become a lot like chum. Sliced and diced by new technology and weak laws, pieces of personal privacy regularly get tossed overboard like tasty bait for business and government.

If they nibble long enough, nothing will remain.

WHEN SO MANY SECTORS SELL AND TRADE DATA, PRIVACY IS DOOMED

Edward C. Baig, Business Week, April 5, 1999; Pg. 84 TITLE: PRIVACY // acs-VT2001

By slapping high prices on personal information, E-business adds a frightening new dimension to the privacy debate. That fear extends across society. Hospitals and schools, for example, are constructing vast national databases with everything from your child's fourth-grade report card to the unique twists and turns of your DNA. Businesses want that information, and in the online world -- where virtually every piece of data is for sale -- they will probably get it. ''You already have zero privacy. Get over it,'' Sun Microsystems Inc. CEO Scott G. McNealy glibly noted at a recent computer-fest.

OUR PRIVACY IS UNDER ATTACK FROM AN UNLIMITED NUMBER OF DIRECTIONS

Tom Regan The Christian Science Monitor January 27, 2000, SECTION: FEATURES; BOOKS; Pg. 17 TITLE: Don't look now, but we know all about you // acs-EE2001

Garfinkel is the first to decisively and persuasively marshal all the information to show how privacy is under constant attack, often by people who claim to have our best interests at heart. It's this emphasis on the role that capitalism and the free market play in diminishing our privacy in the name of making money that will no doubt upset the most people. But as Garfinkel writes, the evidence can't be ignored. These days, advertisers, venture capitalists, and marketers demand more and more personal information about customers before they'll advertise in the media, or back a new start-up, or invest in an established company. Consequently, we're being asked for more and more personal information from corner stores, online retailers, and mail-order firms. Sometimes that information is gathered without our permission, as shown by the recent Electronic Privacy Information Center report on online retailers. (Not a single firm in the top 100 online retailers had adequate privacy protection practices, and several dozen employed ads that track your movements online even after you've left their site.)

IN AN INFORMATION SOCIETY PRIVACY IS THREATENED FROM ALL SIDES

ESTHER DYSON, edits the technology newsletter Release 1.0, Los Angeles Times March 20, 2000, SECTION: Business; Part C; Page 3; TITLE: CONTROL OF PRIVATE DATA BELONGS IN HANDS OF CONSUMERS, NOT VENDORS // acs-VT2001

The concept of privacy is changing radically as a result of our new computer-based lives. Privacy used to be achieved through the sheer "friction" of everyday life: distance, time and the lack of records. Information didn't travel well, and most people who wanted to escape their pasts could simply move to a new location.

Now the picture has changed. You can escape your surroundings through the Internet, but your actions can easily catch up with you.

And it's not just the Internet; it's electronic toll roads (Exactly when did you leave that party?), credit card transactions (We know what hotel you went to), vendor databases (And what book you bought), cell-phone records (Whom you called), and much, much more.

At work, your arrival and departure times may be recorded, along with your Web searches, e-mail messages and sick days.

BIG BROTHER ISN'T THE THREAT -- IT IS LITTLE BROTHER -- THE REAL RISK TO PRIVACY IS THE MULTIPLE SOURCES AND STREAMS OF INFORMATION

The Atlanta Journal and Constitution, September 5, 1999, SECTION: Editorial; Pg. 4H TITLE: EDITORIAL: 'Little brothers' eroding privacy; No secrets: Expanding technology has created a large network of ways to find out nearly anything about anyone. // acs-EE2001

They warned us, generations ago, about the menacing specter that hovered over our future: Big Brother, the huge, domineering beast that would sit, all- knowing and all-powerful, in the seat of power and use centralized technology for surveillance, information and propaganda to control all that we saw, all that we knew, all that we did.

For some, the demon would be a government; other scenarios imagined a supreme force of more vague identity, an amalgam of politicians, businesses, warlords, churchmen, you name it. In every case, however, Big Brother was envisioned as a single entity, a monolith that would function with unmitigated malice in pursuit of absolute power.

Despite cranky sentiments about the Internal Revenue Service, the predictions never came true, at least not in America. No real Big Brother here. Before you relax, though, here's the bad news: Instead of one big mainframe computer that sees all, knows all, technology has created a nearly infinite network of "little brothers," each of which knows a lot more about you than you realize. And if they get together, you don't have a secret left untold.

NOTHING IS PRIVATE ANY MORE — FROM EVERY DIRECTION

RICHARD DES RUISSEAUX, The Courier-Journal (Louisville, KY.), January 19, 1999, SECTION: FORUM Pg.07A TITLE: A LOOK AHEAD TO THE YEAR 2000 PRIVACY RETREATS AS TECHNOLOGY HURTLES FORWARD Hysteria' // acs-EE2001

If you believe that what you do in the privacy of your own home is no one else's business, you probably believe in Santa Claus too. Either that or you live in the woods, with no neighbors, no telephone and no computer that hooks you up to the Internet. As we hurtle into the Information Age, the same technologies propelling us forward at break-neck speed also are shattering the privacy barrier, at home, at work and everywhere in between.

MULTIPLE INFORMATION SOURCES MEAN YOUR PRIVACY IS SHATTERED

RICHARD DES RUISSEAUX, The Courier-Journal (Louisville, KY.), January 19, 1999, SECTION: FORUM Pg.07A TITLE: A LOOK AHEAD TO THE YEAR 2000 PRIVACY RETREATS AS TECHNOLOGY HURTLES FORWARD Hysteria' // acs-EE2001

While your life may not be an open book, chances are that enough chapters are available now for anyone to make an educated guess about the plot. Each adult in the developed world is located, on average, in 200 computer databases,'' says Simon Davies, director general of Privacy International, an advocacy organization headquartered in London. Every time you fill out a warranty card, charge your groceries, enter a sweepstakes, make an 800 call or surf the Web, somebody's collecting more information about you. To be sure, most of it is innocuous enough, and the aim is generally to create a profile of your interests and buying habits so that someone can sell you something. But you never know when this information will jump up and bite you