Skip to main content

Privacy? Forget it, we're all celebrities online now

In our constant desire to be connected, we've created a world in which the definition of privacy keeps changing.
In our constant desire to be connected, we've created a world in which the definition of privacy keeps changing.
  • To participate in online society today, people must sacrifice some level of privacy
  • Professor: In a way, we're all at least minor Internet celebrities -- deal with it
  • Experts encourage users to take more control of their online lives
  • Teens shrewdly coding messages is one way to restrict information

(CNN) -- The controversy over National Security Agency data mining has spawned columns featuring ominous references to Orwell and Kafka, reassurances from politicians and jokes (made on the Internet, of course) about the government peeking through the blinds.

But often lost amid it all is a simple fact: This is the world we have made.

Oh, maybe you didn't make it, and I didn't make it, but enough of us voted for it with our ballots and pocketbooks and Web surfing that it has come to pass regardless.

Like it or not, the online world today is one in which we're expected to participate. Whether because of peer pressure, sheer convenience or clear-eyed decision making, we join social media sites, order merchandise online, store things in the cloud and burnish our "digital brand."

Meanwhile, we don't read End Use License Agreements (bo-ring!), freely exchange personal information on Facebook and insults on Twitter, enjoy tailored recommendations on Amazon and swipe key tags to take advantage of targeted discounts at grocery stores -- places where we often take pleasure in tabloid covers revealing invasions into other people's privacy.

So you thought paparazzi-level scrutiny was only for celebrities? Syracuse University's Anthony Rotolo has news for you: Thanks to the Internet, we're all celebrities on some level now.

After the crash: License, registration and cellphone, please

It\'s not easy to have a digital social life and still preserve a measure of personal privacy.
It's not easy to have a digital social life and still preserve a measure of personal privacy.

"In reality, we're all kind of on 'Big Brother' -- on a reality show," says Rotolo, a professor who runs the Starship NEXIS lab, focusing on social networking and new technologies. "Whenever I give a talk, whenever you give a talk, there's going to be someone live-tweeting it. There's going to be somebody posting a picture on Facebook. We are redefining celebrity in this age, and anybody at any time could be speaking publicly without realizing it."

At its most extreme level, our hunger for sociability can turn minor incidents into major media firestorms, thanks to the Web's viral capabilities. One minute you're leaving a crummy tip; the next your message is all over the Web. One minute you're a bullied bus monitor; the next someone is raising hundreds of thousands of dollars on your behalf.

But even small pebble drops into the vast pool of the Internet can leave big ripples. How often have you made a purchase on one site -- or even just done some online window-shopping -- to find that ads on dozens of other, unrelated sites were suddenly pitching you the same product? And what about that misunderstood text that turns into a local flame war? And never mind the seemingly narrow online sleuthing that becomes an online lynching.

"A lot of stuff (online) plays out in public," says Rotolo, who believes we're still learning how to deal with it all.

So is it possible to have an active digital social life and still preserve a measure of personal privacy? Experts say yes.

'A choice'

Leaving a trail of digital footprints makes some people uncomfortable -- whether they're thinking about Big Brother or simply being judged by their extended friends and family. You have to set limits, says Daniel Sieberg, author of "The Digital Diet."

"What we choose to share or consume through social networks is a choice. Sounds simple, but sometimes we seem to forget that concept," he says. "In writing the book, I felt that I was sharing too much personal information in a public setting and not also connecting with friends and loved ones in a more direct fashion, too."

The National Security Agency may be the focus of controversy, but privacy issues are everywhere.
The National Security Agency may be the focus of controversy, but privacy issues are everywhere.

He draws a line between his personal and professional lives.

"Occasionally I will share photos of our 2-year-old daughter on social networks but it's only in rare cases and I try to send unique photos to my family," he says. "That's a decision we made about keeping some of our private life away from the digital lens."

Gary Vaynerchuk, an entrepreneur and founder of the social media brand consultant VaynerMedia, has the same outlook as Sieberg. He's aggressive with his business and himself; he's reserved when it comes to his wife and children.

Vaynerchuk acknowledges that the all-seeing Web can be a double-edged sword.

"I have thousands of hours of material out there in which I curse every third word," he says. "There's a lot of me out there. I have to deal with that."

But mixing it up socially doesn't bother Vaynerchuk, who often engages with strangers online. For the most part, he says, "we need to start respecting the fact that we're totally in control" of our online personas.

Sure, there are times when Vaynerchuk is tagged or referenced in other people's content. But that's part of life now, he says. Get used to it.

Panic and indifference

Not that some people are too worried about their privacy online. A Pew Research Center/Washington Post survey reported that 56% of Americans found NSA tracking calls to investigate terrorism "acceptable."

And on Friday, Gizmodo writer Kyle Wagner published a widely shared column shrugging at the government-snooping news. It was headlined, "Why I Just Don't Give a S**t About PRISM (Or Any Other Spying)." (PRISM is the name of the NSA data-gathering program.)

Greg Plageman -- an executive producer of the CBS show "Person of Interest," in which two outside-the-system characters use the surveillance state as a way to stop crime -- finds that lack of concern troubling. (Though, he admits with a chuckle, the scandal has provided great fodder for future story lines.)

"Person of Interest" stars Jim Caviezel and Michael Emerson as two men using the surveillance state to right wrongs.

"I think the question becomes, Do people care?" he asks. "There's a measure of indifference here." Plageman thinks people so love the conveniences of modern digital life, and believe their own online existences are so trivial, that they don't see much of a downside to being spied on.

The rejoinder to this has generally gone to the other extreme. In response to Wagner's post, one commenter shot back with the famous verse attributed to Martin Niemoller, the famous Nazi-era German pastor, about not speaking up in the face of tyranny -- the one that concludes, "Then they came for me, and there was no one left to speak for me."

Neither extreme is necessary, say experts. You can exert some control over your online life by taking simple steps such as thinking before you post, doing regular cookie deletions, password changes and antiviral runs, and making sure you've got your social-media privacy settings in order. And remember: There's more to life than being online.

As technology theorist danah boyd (who, like e.e. cummings, spells her name in lower-case letters) points out, we're always interacting with various realms: the state, the individual, the collective and the corporation. Even if we try to opt out -- go "off the grid," so to speak -- we still have identities formed by what others know about us.

"It's not just what you give away, it's what you give off," boyd says. "If you decide you want to opt out of Facebook, that's all fine and well. But most likely, your friends have given Facebook pictures of you -- they've done a lot of different things to build a model of someone who's not even there."

Or, as Sieberg puts it, "It's worth remembering that our activity online isn't in a vacuum. How people -- friends, employers, colleagues -- perceive us can be the sum total of our Internet behavior."

Opinion: Your biggest secrets are up for grabs

Coding secrets

Maybe we can draw some lessons from the demographic group that's most socially engaged: teenagers.

A recent Pew study indicates that though teenagers are sharing more of themselves than ever, they're also using code to hide that information from others. That concept meshes with boyd's field work, she observes.

In one of the cases she studied, a teen who had recently broken up with her boyfriend was worried her mother would overreact to her sadness and believe her suicidal. So instead of posting a "woe-is-me" message -- from which her mother would jump to conclusions -- she went the opposite tack and posted the song lyrics from Monty Python's "Always Look on the Bright Side of Life." Her friends got the message right away.

"In the decade I've been watching teenagers, I've watched them get more and more sophisticated in encoding meaning," boyd says.

OK, the pessimists say, but codes can be cracked. And yes, there's always a place for wariness. "Person of Interest's" Plageman is less concerned with the surveillance state per se and more with how long the government will hold on to information. Sieberg urges parents to talk to their children about being smart online.

But there's no putting the genie back in the bottle once it's started sharing memes on Facebook. If you must be a Web celebrity, at least do so with self-awareness, experts say.

"Clearly we live in special times," says Vaynerchuk, who nonetheless remains optimistic that we'll sort out these issues.

"I will always take the bad 1% with the good 99%," he says.

Part of complete coverage on
Data mining & privacy
June 23, 2013 -- Updated 1425 GMT (2225 HKT)
He's a high-school dropout who worked his way into the most secretive computers in U.S. intelligence as a defense contractor.
May 29, 2014 -- Updated 1226 GMT (2026 HKT)
Traitor or patriot? Low-level systems analyst or highly trained spy?
May 29, 2014 -- Updated 1927 GMT (0327 HKT)
What are the takeaways from Snowden's NBC interview? You might be surprised.
April 18, 2014 -- Updated 1152 GMT (1952 HKT)
Months after accepting asylum in Russia, Snowden asked Putin about Moscow's own surveillance practices.
March 12, 2014 -- Updated 1643 GMT (0043 HKT)
A federal judge has refused the Obama administration's request to extend storage of classified NSA telephone surveillance data beyond the current five-year limit.
March 10, 2014 -- Updated 0044 GMT (0844 HKT)
From his sanctuary in the Ecuadorian embassy in London, Julian Assange said that everyone in the world will be just as effectively monitored soon -- at least digitally.
March 11, 2014 -- Updated 0039 GMT (0839 HKT)
In a rare public talk via the Web, fugitive NSA leaker Edward Snowden urged a tech conference audience to help "fix" the U.S. government's surveillance of its citizens.
August 2, 2013 -- Updated 0355 GMT (1155 HKT)
The White House is "very disappointed" that National Security Agency leaker Edward Snowden has been granted temporary asylum in Russia.
December 10, 2013 -- Updated 1357 GMT (2157 HKT)
Spies with surveillance agencies in the U.S. and U.K. infiltrated video games like "World of Warcraft" in a hunt for terrorists "hiding in plain sight" online.
August 2, 2013 -- Updated 1139 GMT (1939 HKT)
Bradley Manning and Edward Snowden both held jobs that gave them access to some of their country's most secret and sensitive intelligence. They chose to share that material with the world and are now paying for it.
August 1, 2013 -- Updated 1435 GMT (2235 HKT)
The NSA's controversial intelligence-gathering programs have prevented 54 terrorist attacks around the world, including 13 in the United States.
August 1, 2013 -- Updated 1854 GMT (0254 HKT)
You've never heard of XKeyscore, but it definitely knows you. The National Security Agency's top-secret program essentially makes available everything you've ever done on the Internet.
August 18, 2013 -- Updated 1304 GMT (2104 HKT)
You may have never heard of Lavabit and Silent Circle. That's because they offered encrypted (secure) e-mail services, something most Americans have probably never thought about needing.
July 24, 2013 -- Updated 1854 GMT (0254 HKT)
"Any analyst at any time can target anyone. Any selector, anywhere ... I, sitting at my desk, certainly had the authorities to wiretap anyone."
July 2, 2013 -- Updated 1356 GMT (2156 HKT)
President Barack Obama responds to outrage by European leaders over revelations of alleged U.S. spying.
August 29, 2014 -- Updated 1954 GMT (0354 HKT)
Browse through a history of high-profile intelligence leaking cases.
July 2, 2013 -- Updated 1437 GMT (2237 HKT)
Former President George W. Bush talks Snowden, AIDS, Mandela and his legacy.
June 26, 2013 -- Updated 1304 GMT (2104 HKT)
Edward Snowden took a job with an NSA contractor in order to gather evidence about U.S. surveillance programs.
June 19, 2013 -- Updated 1047 GMT (1847 HKT)
With reports of NSA snooping, many people have started wondering about their personl internet security.
August 14, 2013 -- Updated 1352 GMT (2152 HKT)
Click through our gallery to learn about other major leaks and what happened in the aftermath.
June 9, 2013 -- Updated 2002 GMT (0402 HKT)
What really goes on inside America's most secretive agency? CNN's Chris Lawrence reports.