- Dec 30, 2010
- 4,484
- 4
- 0
Is Google's next product in the White House privacy report? | ZDNet
The 2014 White House Privacy Report section reads:
Taylor Rodriguez prepares for a short business trip. She packed a bag the night before and put it outside the front door of her home for pickup. No worries that it will be stolen: The camera on the streetlight was watching it; and, in any case, almost every item in it has a tiny RFID tag. Any would‐be thief would be tracked and arrested within minutes. Nor is there any need to give explicit instructions to the delivery company, because the cloud knows Taylor?s itinerary and plans; the bag is picked up overnight and will be in Taylor?s destination hotel room by the time of her arrival.
Taylor finishes breakfast and steps out the front door. Knowing the schedule, the cloud has provided a self‐ driving car, waiting at the curb. At the airport, Taylor walks directly to the gate ? no need to go through any security. Nor are there any formalities at the gate: A twenty‐minute ?open door? interval is provided for passengers to stroll onto the plane and take their seats (which each sees individually highlighted in his or her wearable optical device).
There are no boarding passes and no organized lines. Why bother, when Taylor?s identity (as for everyone else who enters the airport) has been tracked and is known absolutely? When her known information emanations (phone, RFID tags in clothes, facial recognition, gait, emotional state) are known to the cloud, vetted, and essentially unforgeable?
When, in the unlikely event that Taylor has become deranged and dangerous, many detectable signs would already have been tracked, detected, and acted on?
Indeed, everything that Taylor carries has been screened far more effectively than any rushed airport search today. Friendly cameras in every LED lighting fixture in Taylor?s house have watched her dress and pack, as they do every day. Normally these data would be used only by Taylor?s personal digital assistants, perhaps to offer reminders or fashion advice. As a condition of using the airport transit system, however, Taylor has authorized the use of the data for ensuring airport security and public safety.
Taylor?s world seems creepy to us. Taylor has accepted a different balance among the public goods of convenience, privacy, and security than would most people today. Taylor acts in the unconscious belief (whether justified or not, depending on the nature and effectiveness of policies in force) that the cloud and its robotic servants are trustworthy in matters of personal privacy.
In such a world, major improvements in the convenience and security of everyday life become possible.