"Data hunting on the Internet, a manual for self-defense", by Christiane Schulzki-Haddouti
What gets out of the internet? It remains in the future of the rough space of freedom, in which every unpunishment may say his opinion in which boundaries Muhelos are overwound and managed communication over continents? In the information without censorship and control can be spread and reciprocated? In which our encrusted party urban is upgraded from the base? Or the internet becomes more and more to a gigantic department store in which it gives more advertising a little more about something? Whose visitors are guided by step for step, more precisely, clicking and registered by clicking on the style of a thought police? In which everything and each becomes the goods, with preference also the personal data of the users?
Maybe none of the two ideas really applies, but it’s about a directional fight of this scope. Of this, the exciting book of Christiane Schulzki-Haddouti reports. She is used to what you can get used to it from her, which is advanced within a few years to one of the most profiled specialist journalists around the internet: it observes attentive, analyzes primary and describes pracisis. Their texts revealed in each line that they have understood the subject that they describe without the need for the steady and patient mediation from the Eye Verlo: It writes for a sophisticated specialist audience and for the "I-bin-Drin reader" equally. Experiencing and sensational preparations will be searched in vain in your book, the realitat is exciting enough.
Schulzki-Haddouti analyzes the threats of privacy through state and private data hunger and describes the difficulties of traditional data protection to find adaquate answers. Under the chapter call "Markings" Treats them successful and (so far) futile attempts that seem to get under control of the unknown, anonymous internet user for some skiers. Cookies and IP numbers, log files and guid, web cafers and tracking technologies or the new Internet protocol IPv 6 – always mainly, the Internet user, the unknown essence, to tuggle, manipulable, manipulable, manipulable, and thus to make manageable.
An analysis of the privacy threats on the Internet was not complete, it was not also a focus on edge or related technologies. The author does this in your chapter "Future technologies" and deals with u. a. with gadgets, digital television, video monitoring, chip cards, biometrics, digital signatures and DNA analyzes. Another chapter deals with the leakless control of people in their workplace and the legal limits that still exist in Germany.
Why all the college fifers? The fact that it is not all collectors and jagians about the overwake as an end in itself, one shows in the chapter "Data management". Schulzki-Haddouti analyzes the utilization options when personalized data is first under control, describes the strategies of the strategic companies and calls concrete prices. If it applies that one "good record" In the black trade 300 DM costs, then it is easy to calculate that the data trading is a millionchaft.
Must the burger all this must be defeated? Is who goes to the internet, inevitable object of state observation and private sector exploitation? By no means. The development of information technology follows the laws of dialectics. She brings new, fearing surveillance technologies as well as powerful instruments in the hand of each individual, with whom you can protect yourself. Nobody seriously denies the right to anonymity, which every person in the offline world takes daily self-resistant – who runs in everyday life with a wooden name tag in front of the head? Quite exactly this requires some security politicians as soon as we enter the Cyber-Space.
In the chapters Data control and data for sale, the author’s opportunities for self-protection and reports on the offers that the user can find on the Internet (keywords are u. a. Anonymity services, P3P, Identatatsmanager, PGP and – the good old password), their strong and weak. Your conclusion is differentiated: It neither denies the refusal nor the self-protection alone the word, but ultimately looks in a congestion of different approaches currently the only meaningful strategy. It does not relieve the state from the responsibility: self-protection and technical data protection can not replace it for all binding rules. Also in the age of the Internet, the state has not become obsolete.
However, especially in Germany, the misery of a strategy fixed on state regulations is reflected: The German Teleservice Data Protection Act is hardly available from the point of view of protection of privacy. The problem is only that the law is hardly implemented in practice. For example, it prohibits storing BLOPER user data if it is not – exceptional – for billing purposes. Many providers do not sciss with themselves and still save protocol data. This results in an almost paradoxical situation. The burgers have to use anonymization services if they want to preserve their legal rights. What a presentation: The anonymous journey through the network not as an act of anarchy, but as a back-up for an applicable law. Only one of many strangeness on the Internet. Who Schulzki-Haddoutis "Data hunting on the Internet" has read, has good chances of keeping a clear head in this crafted cyberwelt.
Dr. Helmut Baumler is a data protection officer of the country Schleswig-Holstein. Data hunting on the Internet, a manual for self-defense, by Christiane Schulzki-Haddouti, Rotbuch Verlag, 28, – DM