Will a trusted structure that strikes the right balance be developed?
Internet experts and highly engaged netizens participated in answering an eight-question survey fielded by 黑料不打烊 and the Pew Internet Project from late November 2013 through early January 2014.聽One of the survey questions asked respondents to share their answer to the following query:
Will policy makers and technology innovators create a secure, popularly accepted, and trusted privacy-rights infrastructure by 2025 that allows for business innovation and monetization while also offering individuals choices for protecting their personal information in easy-to-use formats? Describe what you think the reality will be in 2025 when it comes to the overall public perception about whether policy makers and corporations have struck the right聽 balance between personal privacy, secure data, and compelling content and apps that emerge from consumer tracking and analytics.聽
Among the themes emerging from 2,511 respondents’ answers were:聽People who operate online are living in an unprecedented condition of ubiquitous surveillance – living a public life is the new default mode. People share in order to enrich friendships, find or grow communities and act as economic agents, and personal data are the raw material of the knowledge economy.The monetization of digital encounters continues to grow as does the shifting relationship of citizens and their governments. Privacy may be a bygone aspect of the Industrial Age. In the future, people who do not have a public profile may seem antisocial or even “creepy.” Those who say it is not possible to create an effective privacy-rights infrastructure say: Governments and industry have very little incentive to reverse the already quite-invasive status quo while they have much to gain from ongoing losses of civil rights in regard to individual privacy and data ownership; people already seem to accept subversion of privacy as an inevitable fact of online life, as an expected tradeoff for something of value; there’s no way the world’s varied cultures, with their different views about privacy, will be able to come to an agreement on how to address civil liberties issues on the global Internet; the situation will worsen as the Internet of Things arises and people’s homes, workplaces, and the objects around them will “tattle” on them; some communities might plan and gain some acceptance for privacy structures, but the constellation of economic and security complexities is getting bigger and harder to manage. Those who say it is possible to create an effective privacy-rights structure by 2025 say: Citizens and consumers will have more control thanks to new tools that give them the power to negotiate with corporations and work around governments; individuals will be able to choose to share personal information in a tiered approach that offers varied levels of protection and access by others; a backlash against privacy invasions in people’s digital lives will inspire the structuring of a new equilibrium between consumers, governments, and businesses; more-savvy citizens will get better at hiding things they don’t want others to see.
This one Web page holds the complete content of the survey report, which is a聽of more than 330 pages of responses from more than 2,500 survey participants. It begins with a long summary with many theme subheadlines segmenting predictions, followed by an even longer second set of predictive statements.
Summary
The terms of citizenship and social life are rapidly changing in the digital age. No issue highlights this any better than privacy, always a fluid and context-situated concept and more so now as the boundary between being privacy and being public is shifting. 鈥淲e have seen the emergence of publicy as the default modality, with privacy declining,鈥 wrote聽Stowe Boyd, the lead researcher for GigaOm Research in his response in this study. 鈥淚n order to ‘exist’ online, you have to publish things to be shared, and that has to be done in open, public spaces.鈥 If not, people have a lesser chance to enrich friendships, find or grow communities, learn new things, and act as economic agents online.
Moreover, personal data are the raw material of the knowledge economy. As聽Leah Lievrouw, a professor of information studies at the University of California-Los Angeles, noted in her response, 鈥淭he capture of such data lies at the heart of the business models of the most successful technology firms (and increasingly, in traditional industries like retail, health care, entertainment and media, finance, and insurance) and government assumptions about citizens’ relationship to the state.鈥
This report is a look into the future of privacy in light of the technological change, ever-growing monetization of digital encounters, and shifting relationship of citizens and their governments that is likely to extend through the next decade. 鈥淲e are at a crossroads,鈥 noted聽Vytautas Butrimas, the chief adviser to a major government’s ministry. He added a quip from colleague who has watched the rise of surveillance in all forms, who proclaimed, 鈥淕eorge Orwell may have been an optimist,鈥 in imagining 鈥淏ig Brother.鈥
This issue is at the center of global deliberations. The United Nations is聽聽calling upon states to respect鈥攁nd protect鈥攁 global right to privacy.
To explore the future of privacy we canvassed thousands of experts and Internet builders to share their predictions. We call this a canvassing because it is not a representative, randomized survey. Its findings emerge from an 鈥渙pt-in鈥 invitation to experts, many of whom play active roles in Internet evolution as technology builders, researchers, managers, policymakers, marketers, and analysts. We also invited comments from those who have made insightful predictions to our previous queries about the future of the Internet.
Overall, 2,511 respondents weighed in on the following questions:
Security, liberty, privacy online 鈥聽Will policy makers and technology innovators create a secure, popularly accepted, and trusted privacy-rights infrastructure by 2025 that allows for business innovation and monetization while also offering individuals choices for protecting their personal information in easy-to-use formats?
Please elaborate on your answer.聽(Begin with your name if you are willing to have your comments attributed to you.) Describe what you think the reality will be in 2025 when it comes to the overall public perception about whether policy makers and corporations have struck the right balance between personal privacy, secure data, and compelling content and apps that emerge from consumer tracking and analytics.聽Consider the future of privacy in a broader social context. How will public norms about privacy be different in 2025 from the way they are now?
Some 55% of respondents said 鈥渘o鈥 they do not believe that an accepted privacy-rights regime and infrastructure is likely be created in the coming decade, while 45% said 鈥測es鈥 that such an infrastructure is likely to be created by 2025.
Despite this very divided verdict, there were a number of common thoughts undergirding many of the answers, for instance, many of those answering 鈥測es鈥澛爋r聽鈥渘o鈥 shared the opinion that online life is by nature quite public. An anonymous respondent even went so far as to say, 鈥淧rivacy will be the new taboo and will not be appreciated or understood by upcoming generations.鈥 Many respondents also suggested that a fluid environment will continue to confront policy makers. Among the common thoughts:
Privacy and security are foundational issues of the digital world
Our question seemed so apt to respondent聽Breanne Thomlison, the founder and president of BTx2 Communications, a marketing and strategies firm, that she predicted there will soon be a new job title called, 鈥淥nline Public Safety and Corporate Monetization Director.鈥 Its functions: to monitor, create, gain, and maintain trust on a global level, as well as manage expectations from each group. 鈥淲ithout this, innovation will not happen,鈥 she predicted.
An executive at an Internet top-level domain name operator who preferred to remain anonymous replied, 鈥淏ig data equals big business. Those special interests will continue to block any effective public policy work to ensure security, liberty, and privacy online.鈥
A promoter of the global Internet who works on technical and policy coordination, wrote, “By 2025, there will be an international consensus among Internet organizations on how best to balance personal privacy and security with popular content and services. The patchwork approach of national privacy protections will be harmonized globally in 2025, and the primacy of security concerns will be more balanced by such an international consensus. In 2025, the public will see the need to reduce the primary focus on security and create a better, workable balance in favor of protection privacy.鈥
People are living in an unprecedented condition of ubiquitous surveillance
John Wilbanks, chief commons officer for Sage Bionetworks, wrote, 鈥淚 do not think 10 years is long enough for policy makers to change the way they make policy to keep up with the rate of technological progress. We have never had ubiquitous surveillance before, much less a form of ubiquitous surveillance that emerges primarily from voluntary (if market-obscured) choices. Predicting how it shakes out is just fantasy.鈥
An anonymous respondent wrote, 鈥淭he politics of surveillance and privacy are so broken, particularly when it comes to industry and government interests, that it is unlikely there will be any positive change.鈥
Another anonymous respondent wrote, 鈥淭here will be a subset of the public rebelling against this surveillance and data-driven society through either withdrawal from the online world or acts of 鈥榗ivil disobedience鈥 against the powerful.鈥
People require little more inducement than
personal convenience to disclose their personal information
Bob Briscoe, chief researcher in networking and infrastructure for British Telecom, wrote, 鈥淟ack of concern about privacy stems from complacency because most people’s life experiences teach them that revealing their private information allows commercial (and public) organisations to make their lives easier (by targeting their needs), whereas the detrimental cases tend to be very serious but relatively rare.鈥
An information science professional responded, 鈥淚ndividuals are willing to give up privacy for the reasons of ease, fastness, and convenience鈥 If anything, consumer tracking will increase, and almost all data entered online will be considered ‘fair game’ for purposes of analytics and producing ‘user-driven’ ads. Privacy is an archaic term when used in reference to depositing information online. Unlike writing a note of secrecy and keeping it safely guarded inside a vault, keeping information hidden and secure online is radically different. Any vault can be ransacked, but imagine the robbers are hundreds of thousands of miles away, invisible and while traceable, takes time and resources the victim may not have. We live in an age where we all feel like rulers to our information, kings and queens of bank accounts, yet we are not; herein lies the problem.鈥 Relatedly,聽Gina Neff, an associate professor of communication at the University of Washington, wrote, 鈥淧eople will be increasingly more accepting of exchanging privacy for services and customization, unless advocacy and education efforts are increased now.鈥 And聽Niels Ole Finnemann, a professor and director of Netlab, DigHumLab, Denmark, said: 鈥淭he citizens will divide between those who prefer convenience and those who prefer privacy.鈥
Norms are always evolving, and privacy will certainly change in coming years
Nick Arnett, business intelligence expert, and creator of Buzzmetrics, wrote, 鈥淪ociety’s definitions of 鈥榩rivacy鈥 and 鈥榝reedom鈥 will have changed so much by 2025 that today’s meanings will no longer apply. Disagreements about the evolving definitions will continue.鈥
Homero Gil de Zuniga, director of the Digital Media Research Program at the University of Texas-Austin, responded, 鈥淏y 2025, many of the issues, behaviors, and information we consider to be private today will not be so鈥 Information will be even more pervasive, even more liquid, and portable. The digital private sphere, as well as the digital public sphere, will most likely completely overlap.鈥
Rebecca Lieb, an author and an industry analyst for the Altimeter Group, wrote that today鈥檚 Millennials will be policy makers by 2025: 鈥淢y optimistic viewpoint is that, with just a bit more time, those who will attempt to balance the interests of personal privacy and business interests will do so from a more informed perspective, legally, culturally, and with a better perspective on disruption.鈥
And a longer-term perspective was offered by聽David Ellis, course director for the Department of Communication Studies at York University in Toronto: 鈥淟ike so much in online culture鈥 privacy has no end game; the 鈥榬ight balance鈥 today will not be seen as workable tomorrow.鈥
An arms-race dynamic is unfolding
Peter Suber, the director of a US-based project working for open access to research, wrote, 鈥淲e can be sure that privacy technology, like encryption, will continue to improve in ease and power鈥攂ut so will privacy-penetrating technology. It is an arms race today, and I do not see that changing anytime soon. There will always be smart and motivated people on both sides.鈥
An attorney at a major law firm predicted, 鈥淭he current arms race of privacy between individuals who want it and governments who wish to eliminate it will continue unabated. As cryptography grows stronger, so, too will the ability to break it. As new methods of maintaining privacy are created, the government, particularly the US government, will continue to do what it has done since the days of the Clipper chip鈥攄emand back-door access in public, while figuring out how to circumvent it in private… As Google Glass and attendant projects grow, the so-called Internet of Things becomes increasingly aware of literally everything, and as programmers begin jumping on algorithmic schemes to sift, curate, and predict the data, notions of privacy will be considered a fetish. The more data that is captured, the more algorithms will be able to predict, the less privacy we will have, as there will be an assumption that the predictive algorithm is right, and behavior will modify to address actions which have not yet occurred but are likely to a high statistical probability.鈥
Renegotiation and compromise will be a constant in privacy-security policy space
Joe Kochan, chief operating officer for US Ignite, a company developing gigabit-ready digital experiences and applications, observed, 鈥淚 do not believe that there is a 鈥榬ight balance鈥 between privacy, security, and compelling content. This will need to be a constantly negotiated balance鈥攐ne that will swing too far in one direction or another with each iteration鈥 Public norms will continue to trend toward the desire for more privacy, while people’s actions will tend toward giving up more and more control over their data.鈥
An entrepreneur and electrical engineer active in ACM and IEEE wrote, 鈥淚 foresee a minor increase in privacy due to legislation and/or regulation but expect the current tension to continue as innovators find ways to induce people to sacrifice some of their privacy to various compelling (or apparently compelling) applications.鈥
And an anonymous respondent wrote, 鈥淎dvocacy groups, service providers, large e-commerce companies, Google/Amazon/Facebook/Twitter, secret services, security officers in companies and consultancies, and individual Internet users鈥 are also very much involved. There will be ongoing tension between these groups, and I expect media panics and strategic games.鈥
Other resounding themes
It is striking that many in both groups see living a public life online as the new default, though they often made different arguments about whether this would be helpful to creating a widely accepted regime of privacy or would be a harmful development that would lead to the unstoppable erosion of privacy.
Beyond the broad thoughts listed above there were additional themes often touched upon among the diverse concerns and hopes of those who answered the initial question 鈥渘o鈥 or 鈥測es.鈥 A large sampling of the thousands of answers received is organized under these themes in the content that follows.
Themes commonly found in the answers of those who say they expect there will聽not聽be a widely accepted privacy infrastructure by 2025
Theme 1) Living a public life is the new default. It is not possible to live modern life without revealing personal information to governments and corporations. Few individuals will have the energy, interest, or resources to protect themselves from 鈥榙ataveillance鈥; privacy will become a 鈥榣uxury.鈥
A principal engineer at Cisco wrote, 鈥淚 would like to eat all I want聽and聽lose weight, but that trick does not work either.鈥 An anonymous respondent wrote, 鈥淧rivacy rights will be managed by market solutions, with the affluent able to maintain better control of their privacy. Like luxury cars and summer homes, control over private data will be the privilege of winning financially.鈥
Kate Crawford, a professor and research scientist, responded, “The last 10 years have given us a discouraging surfeit of evidence that companies will preference their ability to extract, sell, and trade data than establish simple, easy-to-use privacy protecting mechanisms. In the next 10 years, I would expect to see the development of more encryption technologies and boutique services for people prepared to pay a premium for greater control over their data. This is the creation of privacy as a luxury good. It also has the unfortunate effect of establishing a new divide: the privacy rich and the privacy poor. Whether genuine control over your information will be extended to the majority of people鈥攁nd for free鈥攕eems very unlikely, without a much stronger policy commitment. Optimistically, people are better informed about how their data can be used to discriminate against them and demand greater security, privacy, and access to due process. Pessimistically, people may want those things, but they have no real power to get them.”
The executive director of a nonprofit that protects civil liberties online responded, 鈥淚 do not think policymakers or technology innovators have the incentives to create a privacy-rights infrastructure, but even if they did, I do not believe governments will stop mass surveillance. It breaks my heart, but I do not think we are going to get this cat back into its bag. Sadly, I think individuals will get used to the fact that mass surveillance exists and will not expect privacy by 2025.鈥
Bryan Alexander, technology consultant, futurist, and senior fellow at the National Institute for Technology in Liberal Education, wrote, 鈥淭oo many state and business interests prevent this. Governments, from local to national, want to improve their dataveillance for all kinds of purposes: war fighting, crime detection, taxes, and basic intelligence about economics and the environment. Companies badly want data about customers, and some base their business models on that. I do not see this changing much. Citizen action is probably the best option, much as it was for crypto in the 1990s. But, I do not see that winning over governments and big business鈥 In the United States, both political parties and the clear majority of citizens cheerfully cede privacy.鈥
Clifford Lynch, executive director for the Coalition for Networked Information (CNI) and adjunct professor at the School of Information at the University of California-Berkeley, wrote, 鈥淕overnment and industry have aligned and allied to almost totally eliminate consumer and citizen privacy. This will not be allowed to change at scale鈥攊t is too convenient and too profitable for all parties involved. Today, it is almost impossible for consumers to opt out of the corporate side of this data collection and tracking because it is so pervasive, and, in 2013, the stunning scale of the government side of data collection has become clearer, as well as the government’s willingness to either purchase or legally demand data collected by corporations that the government cannot collect directly. You will see a small fringe of technically savvy people who will try to continue to deploy technology to protect some privacy for some purposes, but this will be small and periodically attacked or placed under particularly intense surveillance. You will also continue to see the government try to punish corporations who try to side with their customers, and reward corporations who are helpful to government objectives.鈥
Cathy Davidson, co-director of the PhD Lab in Digital Knowledge at Duke University, and co-founder and principal administrator of the MacArthur Foundation Digital Media and Learning Competition, wrote, 鈥淚 fear the coming of walled Internets, where there is security but also pay walls鈥攁nd the security is partial. The relationship of privacy, security, and openness is not resolved, and I fear it will not be done in a way that allows for openness in the future.鈥
An anonymous respondent replied, 鈥淭here will not be a trusted privacy-rights infrastructure allowing for individual choice鈥 The overall public perception will be that the right balance has been struck, as privacy will be only a concern for cranks. Employer concerns about employee behavior off-hours will fade, as a generation will have come of age with shared party photos and selfies, and will reject current norms requiring either privacy or sanitized private behavior鈥攁 concept which will have little meaning.鈥
Theme 2) There is no way the world鈥檚 varied cultures, with their different views about privacy, will be able to come to an agreement on how to address civil liberties issues on the global Internet.
Alice Marwick, researcher of the social and cultural impacts of social media and author of聽Status Update: Celebrity, Publicity, and Branding in the Social Media Age, wrote, 鈥淚t will be quite difficult to create a popularly-accepted and trusted privacy rights infrastructure. This is for a number of reasons. First, countries, regions, and cultures differ in their approaches to privacy. For example, the United States, European Union, and Canada all have different approaches to online privacy and what constitutes acceptable data collection.鈥
John E. Savage, chair in computer science at Brown University and a fellow of the IEEE and the ACM, wrote, 鈥淎 secure, accepted, and trusted privacy-rights infrastructure on the Internet, at the global scale, is impossible for the foreseeable future. For too many large nations a tension exists between state security and privacy rights. They will not sacrifice the former for the latter鈥攁 position that is not going to change unless revolutions occur, which is highly unlikely in the more developed nations. In democratic countries, bilateral and multilateral agreements respecting the privacy of citizens for commercial purposes are likely to be developed. It is highly unlikely that nation states will forswear invasion of individual privacy rights for national security purposes.鈥
Henning Schulzrinne, an Internet Hall of Famer, technology developer, and professor at Columbia University, observed, 鈥淓ach country is likely to make very different trade-offs, with continued inaction and stalemate in the United States likely. The influence of policy makers and innovators is limited; most of the privacy issues are beyond the direct influence of either, unless one would call advertising-driven companies 鈥榠nnovators.鈥 Given diminishing returns on traditional advertising and general industry concentration in many areas (from airlines to telecom), there will be increased pressure to gather more data on consumers鈥攊.e., to price-differentiate offerings in near-monopoly settings. There are likely to be limited offerings for privacy protection (i.e., pay email services), but they are likely to be much less convenient or more costly and thus limited to the sophisticated 1% of the Internet population. The question presumes that there is such a public norm today. My perception is that most people do not think deeply about these issues and do not have good ways to understand what exactly is being done. In particular, the notion that PII [personally identifying information] data is and will be available, sometimes by necessity, but that processing and usage of that data are hard to see, make establishing norms difficult.鈥
There鈥檚 also a matter of the cultural differences between Internet business interests and governments鈥 interests. An anonymous respondent replied, 鈥淚 have difficulty foreseeing policymakers and corporations coming to agreement on privacy issues when there is little current agreement. Also, security is clearly not a high priority for corporations, and there seems to be little effort on the policy side to compel them to take it seriously. Content and apps will take care of themselves. I also do not see privacy becoming a major norm without some very major, personally affecting event. There are already tools that do not get taken advantage of to help with privacy, and people make little effort to change their behavior to promote privacy.鈥
Theme 3) The situation will worsen as the Internet of Things arises and people鈥檚 homes, workplaces, and the objects around them will 鈥榯attle鈥 on them. The incentives for businesses to monetize people鈥檚 data and governments to monitor behavior are extremely potent.
An anonymous respondent wrote, 鈥淎s long as greed plays a role in our society, it will always be dominant in how policymakers and corporations treat the individual. There will be less privacy and more access to everything, including your DNA.鈥
Vickie Kline, an associate professor at York College responded, 鈥淢edical privacy will be the most paradoxical; we will have unprecedented data at our fingertips to make proactive decisions about our health, but the objects around us, and even our clothes, will tattle in real-time about the choices we make. We have to work towards security, liberty, and privacy online, but government and corporate intelligence and hackers will always keep us outside of the comfort zone. I wonder if the expectation of privacy as a right will gradually fade as people experience less actual privacy in their lives.鈥
Bill Woodcock, executive director for the Packet Clearing House, responded, 鈥淭he year 2025 is 11 years away. Over the past 11 years, both public expectations and the reality of privacy online have degraded substantially, and I do not see any net reversal in the direction of that trend. There are certainly bits of progress here and there, but I imagine that in 2025 the same incentive structures will be in place: corporations will still see immense benefits to correlating and de-anonymizing PII [personally identifying information], politicians will still either be in the pockets of lobbyists or pursuing their own unrelated agendas, and individuals,聽en masse, will still be too clueless to protect their own data. A new generation will have come of age at that point鈥攑eople who have dealt with these issues since childhood. If we look at other generations that have come of age in eras of new technology (the automobile, television, ubiquitous advertising, etc.), we see a greater and more pervasive sophistication in parallel with ever-greater volumes of change. Following that logic, PII will be collected even more than now鈥攍iterally, at every turn, in every public place, any time one uses most technology products; but, users will have a general awareness that that’s the case, and most users will take some steps to manage or mitigate it.鈥
A self-employed software designer and policy researcher wrote, 鈥淧olicymakers and private industry will do what it takes to convince consumers that they are reasonably secure, while also continuing to permit industry to exploit consumer information (at individual and collective levels) in new ways for profit and for purposes that suit state 鈥榥eeds鈥 (these needs being determined by the dominant value system, which usually is framed in terms of promoting free market-based ‘innovation,鈥 state security, taxation, etc.). If we are speaking about so-called Western states: the young people today will be adults. They already have too much control as the main consumers of technology and as the voices that industry caters to and tries to manipulate through ‘identity empowerment.’ At that point, they will be the value definers. They already have completely different concepts of personal identity, privacy, etc… We can expect that 鈥榩rivate鈥 will not be an adjective that commonly precedes 鈥榮pace鈥 or 鈥榣ife,鈥 and that public disclosure and exposure of intimate life or economic details may not even be described as such, that associating corporate brands with personal identities will continue to perpetuate until people do not even recognize branding as branding (actually, that is already the case 鈥 cf. ‘sent from my iPhone’ and logos on clothing). Even physical 鈥榩rivate property鈥 may become more exposed and less private, as we increasingly turn to home automation technologies to remotely control our door locks, IP security cameras, lights, alarms, etc.鈥
Kalev Leetaru, Yahoo fellow in residence at Georgetown University, wrote, 鈥淲hile鈥 people publicly discuss wanting more privacy, they increasingly use media in a way that gives away their privacy voluntarily鈥攆or example, broadcasting their location via phone GPS when posting to social platforms, photographing their entire lives, etc. People seem to want to be famous, documenting their lives to the most-minute detail, in ways that would have been unheard of to a past generation. Moreover, each time a major social platform reduces privacy even further, there is a roar of public backlash and promises that people will leave聽en masse, but no one actually leaves the platforms, and in fact, more sign up. Thus, people are not voting with their feet. Companies have no incentive to increase privacy, which reduces revenue possibilities in terms of selling advertising and products based on identity and desires鈥 For my detailed thoughts on this,聽聽for a volume on changing norms on privacy.鈥
Theme 4) Some communities might plan and gain some acceptance for privacy structures, but the constellation of economic and security complexities is getting bigger and harder to manage.
A pioneering academic computer scientist from Princeton University wrote, 鈥淚 do not expect a comprehensive solution in this area, nor one that makes everybody happy. These will continue to be contested areas, with different parties using legal, political, and technological means to advance their interests. We will have a stronger and better-defined notion of how to protect vulnerable populations such as children. We will have a better-defined set of social norms around the use of private information. We will have a better understanding of how 鈥榩seudonymous鈥 information about behavior and relationships affects people’s privacy interests.鈥
Alex Halavais, an associate professor of social and behavioral sciences at Arizona State University, predicted, 鈥淭here will be multiple such infrastructures within smaller communities, but nothing even approaching broad acceptance. The problem being addressed is a significant one, but efforts thus far have proven to be too complex to navigate effectively. If history is any guide, concerns over the NSA incursions and related breeches of privacy will be too short-lived to create the impetus for real change. Perhaps, however, we may see a slight increase in the availability and use of strong encryption tools. I suspect our language around privacy may evolve. The word, on its own, is too broad to encapsulate the broad range of concerns: everything from marketers stalking Web traces to state use of CCTV [private video surveillance]. Until the issue of 鈥榩rivacy鈥 is appropriately segmented, we will have a tough time either talking about it or addressing it.鈥
A distinguished engineer, working in networking for Dell, wrote, 鈥淭here are too many challenges to maintaining privacy and providing security at the same time. In some ways, they are conflicting goals. People will become more aware of the lack of privacy, but, if at all, there will be less of it.鈥
Brian Butler, a professor at the University of Maryland, responded, 鈥淲ithin the United States, we have already largely decided to privilege the corporate use of personal data for 鈥榰tilitarian鈥 purposes, to the point where is it difficult to see what could happen in the next twelve years to shift this鈥 I suspect that there is a developing privacy 鈥榙ivide鈥欌攐ne group (the same group that 鈥榳ins鈥 in the case of the digital divide) will have the technical and literacy skills to manage privacy鈥攂ut because of this, they will be cavalier with this (hence the 鈥榩rivacy is outdated鈥 idea). On the other hand, individuals who lack the skills, ability, or time to manage this complex issue will be increasingly subject and resigned to less and less privacy and control. One thing that we have to remember is that it is hard to figure out the institutional and technical aspects of privacy if you are working two or three high-effort jobs and trying to stay awake.鈥
A principal engineer with Ericsson wrote, 鈥淭he real danger here is not just the further invasions of privacy, but also the increasing impression that people can have their behavior modified 鈥榝or the good鈥 through these means. The danger comes when people move from attempting to modify behavior for commercial reasons to trying to modify behavior for political ones, by examining what makes people think a certain way or prompts them to take action or causes them to believe certain things en masse. In fact, it can be argued that we are already seeing this sort of thing take place, with large data analytics firms, such as Google and Facebook, getting deeply involved in politics. The Internet will go in one of two directions: either people will reject behavior modification through data mining en masse, or we will become so habituated to having our behavior modified through data mining that we will not even consider the consequences by the time 2025 rolls around. It is hard to tell which direction things are going to go at this point, but if it is the former, the backlash against technology in general is going to be greater than we imagine, I think. By 2025, privacy will be a moot issue, most likely. Instead, we will be focusing on the moral issues behind using proven techniques of behavior modification, if there is any debate at all.
Themes commonly found in the answers of those who say they expect there聽will聽be a widely accepted privacy infrastructure by 2025
Theme 1) Citizens and consumers will have more control thanks to new tools that give them the power to negotiate with corporations and work around governments. Individuals will be able to choose to share personal information in a tiered approach that offers varied levels of protection and access by others.
Doc Searls, director of ProjectVRM at Harvard University’s Berkman Center for Internet & Society, wrote, in part, 鈥淭here will be a privacy rights infrastructure in place long before 2025. I believe it will materialize within the next three to five years鈥 [It] will come from new technological approaches that enable individuals and organizations to operate in full privacy without fear of surveillance. These approaches will be distributed, rather than centralized鈥 Key to our emerging privacy-creating system will be the ability of individuals to assert their own terms, policies, and preferences in dealings with others, including companies and governments鈥攁nd for equal consenting parties to work out norms that do not require intervention or control by large companies or governments… The end state will be one in which individuals will enjoy far more control of their personal data, and privacy in general, than they do today, and that will be good for business.鈥
David Weinberger, a senior researcher at Harvard’s Berkman Center for Internet & Society, observed, 鈥淭hey will because they have to. Unfortunately, the incentives are unequal: There is a strong incentive to enable strong privacy for transactions, but much less for enabling individuals to control their own info. So, of course, I do not actually know how this will shake out. I assume we will accept that humans do stupid things, and we will forgive one another for them. When your walls are paper, that is what you have to do.鈥
Jim Hendler, an architect of the evolution of the World Wide Web, and professor of computer science at Rensselaer Polytechnic Institute, wrote, 鈥淭here will be significant progress in this area, although choosing 鈥榊es鈥 was the only way to go [in answering the survey question] I think there will still be many privacy issues continuing to evolve. People will be more aware of how their information is being used, who is allowed to collect it, and what redress they have when there are violations; however, the amount of personal information that will be available, and the potential for abuse, will also grow rapidly. Thus, I think there will still be many issues to be resolved. The basic notion of what 鈥榩rivacy鈥 means will have to change in terms of various rights.鈥
JP Rangaswami, chief scientist for Salesforce.com predicted, 鈥淚 suspect that, in times to come, privacy rights will begin to look like the 鈥楩our Drivers鈥 in the Nohria-Lawrence 鈥楧riven鈥 model: the right to 鈥榙efend鈥 private information; the right to 鈥榖ond,鈥 or share, it; the right to 鈥榣earn,鈥 or gain insights, from it; and the right to 鈥榓cquire,鈥 or own, it. As we learn more about the value of personal聽and聽collective information, our approach to such information will mirror our natural motivations. We will learn to develop and extend these rights. The most important change will be to do with collective (sometimes, but not always, public) information. We will learn to value it more; we will appreciate the trade-offs between personal and collective information; we will allow those learnings to inform us when it comes to mores, conventions, and legislation.鈥
An anonymous survey participant who works in the US executive branch, commented, 鈥淕overnments will have to learn to do more as public-private partnerships and active engagement with citizens to do crowdsourcing. The nation-state model is already being challenged; issues span borders and across sectors. The infrastructure will require transparency among governments as a trusted partner鈥攂ut also recognizing that not all data can or should be made open. We will be trusting machines more; we will have our digital device (a smartphone, an embedded device in us, etc.) interface with systems to pre-negotiate what information we will and will not share. End-user licensing agreements will be machine-to-machine.鈥
David Bollier, a long-time scholar and activist focused on the commons, responded, 鈥淭here are feasible alternatives already being developed, such as by聽ID3 in Boston. Here are two pieces that shine a light on this area鈥(summarizing Fred Wilson) 鈥 and the other,聽 The existing structures are highly unlikely to yield the infrastructure that we need鈥攂ut an alternative system is still possible, if only because the latent network value of doing so is so huge. Assuming the infrastructure development pathway mentioned above comes to pass, privacy norms will be affirmatively structured and managed, mostly by tech systems amenable to meaningful human control, rather than 鈥榯aken for granted鈥 as a natural social reality. This will require that ordinary individuals be empowered to protect their privacy rather than relying upon government surrogates to do so. We have seen how government is far too beholden to national security and incumbent corporate interests, and too centralized and bureaucratic in a networked age, to be an effective watchdog and implementer of larger collective concerns.鈥
Theme 2) The backlash against the most egregious privacy invasions will bring a new equilibrium between consumers, governments, and businesses鈥攁nd more-savvy citizens will get better at hiding things they do not want others to see.
Peter McCann, a senior staff engineer in the telecommunications industry, responded, 鈥淭here is a large momentum toward increasing privacy protections on the Internet in the wake of the Snowden revelations. A new infrastructure of pseudonymous communication and transaction will be created over the next few years, with robust privacy protections built in. These protections will take the form of a distributed database, where cooperation among many entities will be required to reveal personal information about a user, making the secret warrant useless, and warrantless intrusions on privacy impossible. There will be a broad expectation of privacy unless social norms are violated in an obvious way, in which case, the offender will be rapidly tracked down and sanctioned.鈥
Christian Huitema, a distinguished engineer with Microsoft, replied, 鈥淚 expect many efforts to make the Internet more robust to attacks, including attacks by secret services. But, I do not think that privacy rights can be protected by an 鈥榠nfrastructure.鈥 They can, on the other hand, emerge from competition, i.e., 鈥榝ree as spy鈥 services competing with some 鈥榩ay and trusted鈥 services. People are going to learn what to share and how to share it. We see that, already, among the young generation. Project a neat, public image, and keep your personal stuff actually private.鈥
Tom Standage, digital editor for The Economist, wrote, 鈥淎s with financial regulation, privacy regulation makes progress as a result of regular crises. Technology firms (and security agencies) will repeatedly over-reach and then be brought into line by consumer pressure/boycotts and new regulations. In this way, we will discover where people would like to draw the line when it comes to paying for Internet services using personal data. I think this trade-off will become more explicit: use this service free by giving us access to your data, or pay for it. For a long time, it has been assumed that Gen Y-ers have a different attitude to privacy and are more inclined to make everything public; the success of Snapchat this year suggests otherwise. As people get older, they worry about this more. It is possible to have mass take-up of publishing tools, while also agreeing that it makes sense to keep some things private.鈥
Theme 3) Living a public life is the new default. People will get used to this, adjust their norms, and accept more sharing and collection of data as a part of life鈥攅specially Millennials and the young people who follow them. Problems will persist and some will complain but most will not object or muster the energy to push back against this new reality in their lives.
Stewart Baker, a partner at Steptoe & Johnson, a Washington law firm, wrote, 鈥淪ecurity is a pain in the butt, a major inconvenience. It also hampers innovation. We will not give up convenience and innovation without living through a disaster. Almost everything we are shocked and worried about鈥攊ncluding all the things we are saying the government should never do鈥攚ill be commonplace by 2025. And, it will not really bother us that much. Privacy is the most malleable of expectations.鈥
Ben Shneiderman, professor of computer science at the University of Maryland, wrote, “There will continue to be pressures for increased security, liberty, and privacy, but there are powerful forces working to enable businesses to track behavior, as well as government to monitor activity. While I am not fearful of dystopian futures, doing things on the Internet will be much more like being in public than being in the protected privacy of your home. Recognition of the Internet as a public, and not private, space will be more widespread. There will still be scams, pornography, stalking, etc., but the worst cases will be stopped, and Internet benefits will outweigh threats. Premium services that offer more privacy will be valued.鈥
Marjory Blumenthal, a science and technology policy analyst, wrote, 鈥淭here is a lot of pressure to do something鈥攏ow. So, one can expect work on an infrastructure that will be relatively secure. Whether it will be popularly accepted鈥攖hat is harder to say, since skepticism has skyrocketed. People will become more aware of the tradeoffs, which will drive an evolution of norms. They will also have become more sophisticated about choices regarding disclosures they make, exercising finer-grained control鈥攊n part because there will be more technical support for doing so鈥攁nd there will also have been evolution of the legal and regulatory framework.鈥
Jeff Jaffe, CEO for the World Wide Web Consortium, the standards-setting body for the Web, wrote, 鈥淭oday鈥檚 policy makers have difficulty in making basic policy tradeoffs in existing areas such as spending and taxes. They are not ready to step up to these new complex issues. The generation of teenagers growing to adulthood will have different norms for privacy than today’s adults.鈥
Jonathan Grudin, principal researcher at Microsoft Research, responded, 鈥淭here is an inevitable tension between potential commercial exploitation of personal information by businesses, including those that are well-intentioned, and the desires of some individuals. Businesses will always be motivated to push infrastructure boundaries, whatever they are. In fact, the more work we invest in developing a framework that seems balanced, the more a business can find grey areas, workarounds, and loopholes in good conscience. Young people are more used to a world with cameras everywhere. They spend more time online and identified. The older generation developed behavioral habits that assumed a degree of privacy that young people have not experienced. What oldsters would have to give up, young people will not miss. In 2025, more of the population will have grown up in the new world, so concern about privacy will decrease and perhaps shift in emphasis. Of course, the dwindling ranks of dinosaurs may not see things much differently than they do now.鈥
Privacy is a passing artifact of the industrial age
One further insight emerged in several answers鈥攖hat privacy might gradually fade and become recognized as a social construct of the industrial age. Several noted that the rise in urbanization that came once factories were built moved people from villages where they enjoyed little privacy into social settings where privacy among the masses could be achieved. Now, the pervasive social connectivity and awareness afforded by digital technology could be returning people to that village-like environment.
One version of that thought came from聽Bud Levin, a futurist, and professor of psychology at Blue Ridge Community College in Virginia: 鈥淚ncreasingly, and gradually, people will realize that privacy, anonymity, confidentiality, secrecy, and similar constructs of the industrial age, are giving way to ubiquitous transparency. Consider how we might behave when we know that everything we do is or could easily become headline news. Privacy laws will become more obviously incompatible with normal behavior. They will be trying to push back the ocean. That is likely to generate increasing contempt for government.鈥 And聽Vickie Kline, an associate professor at York College responded, 鈥淕overnment and corporate intelligence and hackers will always keep us outside of the comfort zone. I wonder if the expectation of privacy as a right will gradually fade as people experience less actual privacy in their lives.鈥
A synthesis of “yes” and “no” that considers impacts of the Internet of Things and AI
One thoughtful writer synthesized a variety of 鈥測es鈥 and 鈥渘o鈥 themes and put them in the context of a future in which the Internet of Things, more powerful artificial intelligence, big-data analytics, and other factors combine to learn and infer things about individuals.
Barry Chudakov, founder and principal of Sertain Research, wrote, 鈥淏y 2025, we will begin to define an emergent problem: any secure, popularly accepted, and trusted privacy-rights infrastructure must balance transparency with intrusion, and as we develop subtler and more powerful technologies that become ever more intrusive, we will realize how difficult this is.
We will continue to monetize watching and tracking; cameras and recognition technologies will create 鈥榚veryware.鈥 As we do, rights and choices will collide; we will struggle to satisfy forces of personal privacy, secure data, compelling content, and tracking and analytics. This entails 鈥榯hinking fast and slow鈥欌攁nd in a decade, we will still struggle with statistical (probability) thinking versus quick-get thinking. We will be challenged to not fall in love with our invasive tracking, watching, and predictive technologies and their beautiful data displays, marketed in easy-to-use formats.
We will slowly realize the inherent conflicts between our data summations and the reality they are summarizing. Privacy will ostensibly be hidden behind this mask of abstract data; it may well be hidden by the seductive insights of simulation. This will create both intense interest and equally intense insecurity about personal information. As monitoring and statistical tools enable us to abstract behaviors to norms, trends, and predictions, it is inevitable, given our inclination to turn information into more information, which we will engage with the abstraction as if it were real鈥攁s if it were the concrete thing it is abstracting. This can lead to inaccurate, even wildly distorted, perceptions, as we saw in the credit default swaps of the 2008 Wall Street meltdown.
A healthy tension will arise: many of us will separate the thing (whatever it is we are tracking and analyzing) from the data abstraction; but equally, many others will not鈥攅ither because they cannot (they are not trained or equipped to do so) or because they do not want to. Yes, more average persons will start to understand opt-in data capture and monitoring protocols that enable tracking and analytics. But, when our gestures and bodily identifiers鈥攇ait, ear lobes, eye movements, faces, emotional responses, or behaviors and choices鈥攁re the content of that tracking and analysis, we ourselves become the abstraction.
I do not believe that, in a decade, we will have resolved all the quandaries of this new reality. We will become smarter about it, but we will also be more conflicted. This abstraction of our actions and inclinations is bedeviling because privacy and tracking and analytics should be at odds with each other; they are strange bedfellows, and we are better served by understanding that tension among them is healthy. Further, once our movements and choices and behaviors are captured, digested, and brought to some enhanced understanding, we may know more about certain actions.
But, in our delight over data and analytics, will we match that with enhanced empathy for and understanding of each other? The public will slowly come to realize that privacy is what we are left with after our technology enables discovery of what we want to know. Do we want to know your actions, your behaviors, and your pathway through the city or store? Do we want to know your face, your emotions, and your demographic data? Do we want to know if you were in a certain place at a certain time? Such knowledge, and much more detailed knowledge of behavior patterns, trends, and predictions, will define privacy in the broader social context.
Like the remainder in a division problem, privacy is the problematic 鈥榓nswer鈥 after we divide our lives by the technology to watch and measure those lives. Knowledge is power (and profit) for some, and it is so-called 鈥榮ecurity鈥 for others. The struggle with the balance between the far-reaching knowing of technology and keeping our identity intact is the future of privacy in a broader social context. We now think of privacy as the ability to keep our information to ourselves. By 2025, we will expand that to include the ability to keep our identity and natures from being invaded by other techno-forces, as well as to keep our identity in line with our intent and volition.
The desire for fame has already put identity up for sale; as our technologies enable us to know virtually anything about others, privacy will become a commodity. It will be sold to the highest bidder; privacy will become the offshore bank account of identity. Regular people will be transparent; those who can pay for opacity will do so via new services and business models. While I think this will eventually be available to more than just the wealthy, we will not have sorted this all out in just a decade, and so, privacy will be available to those with the fattest bank account.鈥
Above-and-Beyond Responses: Part 1
A variety of views in regard to this issue are reflected in these big thinkers鈥 imaginings of what may happen by 2025.
鈥楽ocial punishment may have to be accompanied by legislation鈥
Vint Cerf, Google vice president and chief Internet evangelist, responded, 鈥淭he public will become more sophisticated about security and safety. Corporations and service providers will feel pressure to implement practices including two-factor authentication and end-to-end cryptography. Users will insist on having the ability to encrypt their email at need. They will demand much more transparency of the private sector and, especially, their governments. Privacy conventions will evolve in online society鈥攙iolations of personal privacy will become socially unacceptable. Of course, there will be breaches of all these things, but some will be accompanied by serious social and economic downsides and, in some cases, criminal charges. By 2025, people will be much more aware of their own negligent behavior, eroding privacy for others, and not just themselves. The uploading and tagging of photos and videos without permission may become socially unacceptable. As in many other matters, the social punishment may have to be accompanied by legislation鈥攖hink about seat belts and smoking by way of example. We may be peculiarly more tolerant of lack of privacy, but that is just my guess.鈥
The key will be defaults: Individuals will control their personas or be controlled
Mark Rotenberg, president of the Electronic Privacy Information Center (EPIC), said, 鈥淭here will be many contentious battles over the control of identity and private life.聽The appropriation of personal facts for commercial value鈥攁n issue that emerged with Google鈥檚 鈥榮hared endorsements鈥 and Facebook鈥檚 鈥榮ponsored stories鈥欌攁re a small glimpse of what lies ahead. The聽key will be the defaults: either individuals will control their聽online persona or it will be controlled by others.鈥
鈥榃e will get used to an open society; answer surveillance with 鈥榮ousveillance.鈥欌
贵耻迟耻谤颈蝉迟听David Brin, author of a highly respected book on the future of privacy,聽The Transparent Society, wrote, 鈥淪ee my book,聽The Transparent Society. We will get used to an open society; answer surveillance with 鈥榮ousveillance.鈥 It matters less what others know about us than what they can (not)聽do聽to us. To control that, we must look back at the mighty and watch the watchers. The question implies that the only solution will be to create some paternalistic, unified structure to control and parcel out information. Even if it is designed by honest and skilled people, this approach cannot work. Can you name for me聽one聽example when that ever worked in a reliable way? How many supposedly reliable systems and databases leak (surprise!) every year? There is a better way.鈥
Dynamics of security and privacy 鈥榤ired in ugly politics and corporate greed鈥
danah boyd, a research scientist for Microsoft, responded, 鈥淲hat you’re suggesting sounds like a fantasy. I expect the dynamics of security and privacy are going to be a bloody mess for the next decade, mired in ugly politics and corporate greed. I also expect that our relationship with other countries is going to be a mess over these issues. People will be far more aware of the ways that data is being used and abused, although I suspect that they will have just as little power over their data as they do now.鈥
鈥楴orms and laws are often syncopated with innovation in technology鈥
Jeff Jarvis, director of the Tow-Knight Center at the City University of New York, wrote, 鈥淛ust as with the introductions of many technologies before鈥攖he telephone, the portable camera, even the Gutenberg press鈥攕ociety renegotiates its norms to catch up with progress, as well as to recognize the benefits innovation can bring, while also protecting against its risks鈥 Norms and laws are often syncopated with innovation in technology. Now, with the Internet, we are once again renegotiating our norms around privacy and public-ness. Thanks to Edward Snowden, I hope we will also soon renegotiate our privacy laws and governmental norms. I do believe that the public, business, and government can work to maximize the benefit of the Net, while also minimizing danger. Of course, there is nothing to guarantee they will. Government, threatened by the redistribution of power brought by the Net, could succeed in claiming sovereignty over it, throttling its freedoms. Business could overstep its trust with consumers and bring regulation into place. Media could succeed in breeding moral panic鈥攖echnopanic鈥攐ver anything that could go wrong. But, I hope that enlightened self-interest will prevail…Vint Cerf, co-inventor of the Net, and evangelist for Google, said recently that privacy might be a historical anomaly. That is the kind of blunt, albeit factual talk that can drive a corporate public relations person to drink. Still, he is right that privacy is, by various accounts, a relatively recent invention, born of hallways (allowing people to close doors on their activities) and cities (letting individuals become lost in the crowd). Yet at base, privacy is what it always has been: that which we keep to ourselves, in our heads, unspoken, except perhaps to intimates we trust (though what we tell them is then public to that extent). That is still the case, and always will be, no matter what medium we use to share鈥︹
A tiered-system might have Privileged, Private, Business, Public levels
David P. Collier-Brown,聽a system programmer and author, predicted that by 2025, 鈥淚 expect at least four levels and categories. The levels are:聽Privileged鈥攃ommunications with my doctor, lawyer, Member of Parliament, etc.聽Private鈥攖hings I share only with selected correspondents.聽Business鈥攖hings I share with particular businesses, with protections against aggregation.听笔耻产濒颈肠鈥攖hings I share with everyone. The categories are orthogonal to these, and are identified uniquely as me. I sign聽these聽with the private key I have registered with Elections Canada鈥搃dentified for financial purposes. I sign聽these聽with a private key that has a credit card; the card issuer knows who I am, while others do not. A pen name and age is published for each of聽these, but it may not be strongly linked to me. Right now, I use different middle initials to distinguish self-identifications; to you, I am David P. Collier-Brown; to American Express, I’m David A. Collier-Brown鈥攗nique鈥攍ots of pen-names, avatars and nicknames, partially trackable. I expect people to be less concerned about some areas, like pictures, but more concerned about others, like vendors doing cross-matching. Pictures of nude sunbathing will be about as embarrassing and threatening as naked baby pictures. Ads will have 鈥榡ust for me鈥 categories, but nasty snooping by advertisers will result in picket lines and class-action suits.鈥
鈥楩rom the state to the private sector, surveillance won鈥
Howard Rheingold, a pioneering Internet sociologist and self-employed writer, consultant, and educator, responded, “When I and others wrote about the ways technologies could enable a surveillance-dataveillance state, as early as the 1990s, few Americans really seemed to care. We could foresee that bridge and freeway transponders, credit cards, closed-circuit video cameras, linked via the Internet, with millions of bits of individually insignificant personal information compiled into dossiers by powerful computers, could provide the infrastructure for unprecedented surveillance鈥 it did not take a prophet to foresee those events. After 9/11, massive US government overreach was rubber-stamped by Congress and accepted by citizens. A huge security bureaucracy was set up. When Admiral Poindexter proposed 鈥楾otal Information Awareness鈥 (the TIA program), public outcry shut down the proposed campaign; yet, decades later, when Edward Snowden’s leaks revealed that the NSA had gone ahead with an even more far-reaching program, there was neither widespread citizen protest, nor significant Congressional resistance. At the same time, the most powerful growing sector in an otherwise war-weakened US economy, online media鈥攆rom Google, Amazon, and Facebook on down to every ad-supported Web enterprise鈥攄eveloped a powerful business model based on the same kind of dossiers. From the state to the private sector, surveillance won. At the time of this writing, Google Glass and other surveillance-capable, Web-connected wearables have not been unleashed. It is impossible to tell how people will react to the presence of multiple strangers in almost every public situation, equipped to capture still images and stream video鈥攁nd also equipped with facial-recognition capabilities. Citizens will join the state and digital businesses in the surveillance game. Privacy is a social construct鈥攆or example, until central heating, most people in most houses slept in the same room; in Japan, for centuries, walls were made of paper. Ask any teenager about his or her 鈥楩acebook-stalking鈥 habits. Privacy has already changed.鈥
鈥楨veryone will expect to be tracked and monitored鈥 for services, safety
Hal Varian, chief economist for Google, wrote, 鈥淲e will have some sort of usable infrastructure by 2025, but it will be painful getting there. People will be comfortable sharing personal information with organizations because those organizations will be regulated and audited about their practices. There is no putting the genie back in the bottle. Widespread sensors, databases, and computational power will result in less privacy in today’s sense but will also result in less harm due to the establishment of social norms and regulations about how to deal with privacy issues. By 2025, the current debate about privacy will seem quaint and old-fashioned. The benefits of cloud-based, personal, digital assistants will be so overwhelming that putting restrictions on these services will be out of the question. Of course, there will be people who choose not to use such services, but they will be a small minority. Everyone will expect to be tracked and monitored, since the advantages, in terms of convenience, safety, and services, will be so great. There will, of course, be restrictions on how such information can be used, but continuous monitoring will be the norm.鈥
Facial-recognition expanding; lack of publicness will seem anti-social and creepy
Judith Donath,聽a fellow at Harvard University’s Berkman Center for Internet & Society, responded, 鈥淎 big inflection point will be face-recognition. Today, when we meet a new person, we are likely to do a search on their name, often finding out some surprising hobby or other details, perhaps a lengthy blog history, plus the expected professional information. But, the people we see on the street, in the subway, across the restaurant鈥攖hey remain strangers, enigmatic. Face recognition will change this. We will be able to put a name to a face鈥攁nd all the data attached to that name. For the citizen of that future world, it will seem strange and unsettling to think that in the past people walked, sat, and ate amidst crowds of unknowable strangers. It will seem dangerous鈥攐ne of the first apps that will make use of this technology will alert us to registered sex offenders and paroled felons in our midst鈥攁nd dull. (Today if someone catches your attention, you muse a bit about him or her, and then move on. There is no connection. Tomorrow, you can delve into whatever personal traces they have online.) This will cause a big shift in how we think of privacy and the norms around making information about ourselves public. Today, if someone chooses to have a very low online profile, this has little effect on how we think of him or her face-to-face. But, in this future, that will start to seem anti-social and a little creepy. There will be much more pressure to have such a data presence鈥攁nd to carefully cultivate it.鈥
Exhibit A for the transparent future: My own life
John Lazzaro, a research specialist and visiting lecturer in computer science at the University of California-Berkeley, wrote, 鈥淭he reality in 2025 will look like my own reality today. As an employee of a California public university, my salary is public information, and websites exist to let you search for my salary. When I officially teach a class, statistical summaries of student reviews are publicly available online, and I do not have the ability to take them down. Google Scholar lists the number of references for every paper I have published over the past 25 years, which is a common proxy for research impact. The IETF has a meticulous record of every document draft and mailing list email about the RFCs I have authored, which gives a microscopic window on how I work on a technology problem. This level of disclosure is a feature for me, not a bug. Anyone who is curious about who I am professionally can invest a few minutes in Google searches and decide for himself or herself. It is a more honest portrait than what you will find on a website like LinkedIn. And so, I think it will become the norm by 2025.鈥
Maybe a 鈥楶rivacy Chernobyl鈥 will change things, but don鈥檛 count on it
John Markoff, senior writer for the Science section of the New York Times, responded, 鈥淚 have been writing about privacy, security, and computer networks since the late 1970s. The trend is decidedly away from individual privacy, as well as away from online security. We are on our way to the 鈥楶anopticon.鈥 Conceivably, a 鈥楶rivacy Chernobyl鈥 might alter this, but I do not believe the Snowden materials will. I believe that a decade is an infinite period in terms of Internet time. Too many things are possible, and anything we say today would be largely speculative. I am struck by the fact that there is such a gulf between the European and US privacy norms. I believe this is because of World War II. When the Nazis entered Paris, the first thing they did was head for the phone directory.鈥
鈥楾he drift toward less privacy will only be reversed if there is a perception that privacy concerns are interfering with commerce鈥
David Clark, a senior research scientist at MIT鈥檚 Computer Science and Artificial Intelligence Laboratory, noted, 鈥淲e will have this in a fragmentary way, but it will not have the character of 鈥榠nfrastructure.鈥 … The European Union has more of a tendency to address issues like this top-down; the United States seems to work bottom-up. Privacy rights will differ in different contexts鈥攕ome will be more robust than others. That is why I do not believe that the outcome will seem like 鈥榠nfrastructure.鈥 The drift toward less privacy will only be reversed if there is a perception that privacy concerns are interfering with commerce. Privacy is a residue left over after concerns about security and commerce are satisfied (this thought is not original to me, but I do not remember who said it). There will be a swing back from the total voluntary disclosure we see today on sites like Facebook. What we will see is a more nuanced way for people to deal with their different friends and colleagues, with more expressive ways to control what is shared. But, the pressures for Big Data tracking will continue to erode our expectations of what is known about us without our explicit disclosure.鈥
鈥楢mericans have happily sacrificed their privacy and will continue to do so鈥
Paul Saffo, managing director at Discern Analytics and consulting associate professor at Stanford University, wrote, 鈥淭he opposition to privacy erosion is broad and diffuse, while the proponents of privacy-eroding systems are narrow and focused. Further, while Americans claim to care about privacy, they care even more about convenience. Americans have happily sacrificed their privacy over the last several decades, and will continue to do so, even as they complain. Privacy has already shifted from being a right to a good that is purchased. Privacy-as-good will continue to advance and become the 2025 norm.鈥
鈥業n 2025, we will have a post-Facebook and post-Google world鈥
Marcel Bullinga, a technology futures speaker, trend watcher, and futurist, wrote, 鈥淎 trusted infrastructure聽needs聽to be created in order to prevent massive fraud and massive public distrust in online transactions, and in online life, in general. We have to reinvent the entire Internet as we know it, shifting power from a few American tech companies to the individual who creates, and therefore owns, the data. We need to create a personal dashboard, a safe haven, for every individual’s dossiers, transactions, money, and profiles. In this dashboard, you could set your privacy and communications settings (from 0 to 100%). All of this will create a big struggle about the question: Who owns (my) data? My 2025 statement: In 2025, we will have a post-Facebook and post-Google world. We will have new business models in which facilitating data is more lucrative than owning data. Providers who refrain from owning their customers鈥 data and stick to facilitating the owner in handling their data in a trusted way will win. This means Google and Facebook will lose. If we do not make this transition, we face a privacy and fraud nightmare in which our lives are dominated by a few global tech companies… There are two opposite trends: first, we will adapt to 100% transparency and the utter loss of privacy, accepting that secrets no longer exist. The societal impact of scandals (exposed secrets) will diminish because it is impossible to react with constant indignation when secrets are revealed all the time. Second, we will adapt to 100% privacy. Counter technologies will give us huge amounts of privacy protection, allowing us to pick our own desired level of privacy. Privacy will cost money and will be a paid service.鈥
In 2025, 鈥榚verything will be transparent; people will not have the illusion of privacy鈥
Tiffany Shlain, filmmaker, host of the AOL series聽The Future Starts Here, and founder of The Webby Awards, responded, 鈥淚n 2025, everything will be transparent; people will not have the illusion of privacy. This will, of course, have consequences.鈥
Elaborations: More Expert Responses
Following are additional provocative and thoughtful answers from other respondents, organized in the same format as those in the summary. First, the insights of those who responded 鈥渘o鈥 to the question about whether a popular and trusted privacy infrastructure would be in place by 2025. After that, there are opinions of those who answered 鈥測es.鈥 The report closes with additional observations that move beyond the yes/no framework.
Themes commonly found in the answers of those who say they expect there will聽not聽be a widely accepted privacy infrastructure by 2025
Theme 1) Living a public life is the new default.聽It is not possible to live modern life without revealing personal information to governments and corporations. Few individuals will have the energy, interest, or resources to protect themselves from 鈥榙ataveillance鈥; privacy will become a 鈥榣uxury.鈥
Leah Lievrouw, a professor of information studies at the University of California-Los Angeles, wrote, 鈥淎 way forward for proactive, trusted privacy rights does not seem promising. Especially in the last few years, my sense is that many people, perhaps even heavy Internet users, in particular, have begun to affect an attitude of dismissive cynicism about privacy and surveillance to justify their disengagement with privacy and autonomy issues: 鈥楾hey know everything you do anyway,鈥 where ‘they’ includes anyone or anything from Google to TSA to ISP’s to insurance companies, educational institutions, copyright owners, law enforcement, government, credit agencies, and so forth. I am not sure that those adopting this attitude have a very clear sense of just how extensive the data capture, and data analytics, really are, but it is a habit of mind and public opinion that does not suggest that privacy norms will be stronger in 10 years than they are now.鈥
Kevin Ryan, a corporate communications and marketing professional, wrote, 鈥淎 secure, popularly accepted, and trusted privacy-rights infrastructure will not be possible. Business will not tolerate an Internet without analytics. Analytics will be the basis of advertising rates. Analytics is too deeply engrained in marketing. Security departments within the governments of all countries will not give up tracking activities of citizens. So long as business and the government gets the information they need, we will have 鈥榩rivacy.鈥 We will accept the fact that, legally and practically, we have no privacy. For most, it will not be a big deal. Clandestine networks will be created. People will create homegrown methods of avoiding scrutiny. Most people will come up with avatar aliases to do what they do not want associated to themselves.鈥
Joel Halpern, a distinguished engineer at Ericsson, wrote, 鈥淲hile the described target is highly desirable, I consider that the odds are quite high that the result of the political fighting over these issues will be significantly less than a 鈥榮ecure, popularly accepted, and trusted privacy-rights infrastructure.鈥 Unfortunately, I expect that we will have accepted significantly less privacy than we expect now. I hope, and expect, that we will not have given up all notions of privacy.鈥
Larry Gell, founder and director of the International Agency for Economic Development (IAED), responded, 鈥淏y 2025, there will have been enough collection and monitoring of anyone connected to the Internet that there will be no need for privacy. Your total privacy is almost gone at this point already. The only thing needed by 2025, or earlier, is for the US government to give IBM the rights to use their new nuclear storage technology to store the masses of data and information they are collecting. They are almost there. Once you get everyone to throw away their computer and only use their cell phones for everything, you have them and everything about them. If you never knew you had any privacy rights, why would it be a problem? That is the benefit of retirement and hiring all-new, young people.鈥
A long-time leader of technology development for the World Wide Web responded, 鈥淭echnology evolves so quickly, and thereby creates new and unique user scenarios, that it is unlikely that security/privacy infrastructures can keep pace鈥攎uch less one that is generally accepted. Working in parallel with the policymakers and technology innovators will be a community whose goal is to subvert any security, liberty, and privacy advancements that are achieved.鈥
Peter and Trudy Johnson-Lenz, founders of the online community Awakening Technology, based in Portland, Oregon, wrote, 鈥淲e expect that the hacker/geek/libertarian/individual rights community will continue to develop their own secure networks, encryption, virtual currencies, and the like within the Internet. There are also new DIY networks springing up in communities. For example, see the video(2012). At present, most people still assume that information about themselves is considered private unless, and until, they reveal it and make it public, although this is changing among younger people… [In reality,] information once considered private is often anything but.鈥
Stephen Abram, a self-employed consultant with Lighthouse Consulting, Inc., wrote, 鈥淲e are in for more ‘extreme’ targeting, based on behavioral big data collections and matrices of all of our geo and other tagging systems as a consequence of an evolving digital economy, as well as of using the national security lever to wedge in commercial interests. There will be some ‘sanctuaries’ that protect privacy, but they will be few. There is actually a market opportunity for these places. Libraries will remain a bastion of private spaces, although their online access and digital content may not鈥攙is a vis the Amazon Kindle libraries offering.鈥
Sam Punnett, of Fad Research, observed, 鈥淭he public perception of privacy in 2025 will likely be resignation. The complexity of what constitutes a person’s digital 鈥榝ingerprint,鈥 and the complexity of the systems that monitor them, will remain beyond the grasp of full understanding of most individuals and policy makers. The balance will remain skewed in favour of commercial and government-associated security interests over individuals. There may be 鈥榮ecure data,鈥 but it will be secured within the opaque storage systems and protocols not readily apparent or accessible to the individual citizen. I would rule out any substantive actions by policy makers. I would not completely rule out the inventiveness of technical innovators. It is unlikely that they will craft any absolute solution that puts the individual totally in charge of his or her 鈥榝ingerprints.鈥欌
Andrew Bridges, a partner and Internet law litigator and policy analyst at Fenwick & West LLP, wrote, “The revelations of numerous whistleblowers [like] Edward Snowden 鈥 show that governments and agencies have 鈥榞one rogue,鈥 having no real accountability for their actions because they have, until now, succeeded in cloaking their actions in secrecy. I fear that no amount of political pressure will bring these rogue elements under control, and there will be no trusted privacy-rights infrastructure that is effective against government surveillance. Unless government surveillance of all aspects of society and of all individuals gets under control, all norms about privacy will become hollow, and the expectation of privacy will be nil. We will have to reorder all our actions to reflect the reality that there is no privacy except for the secrecy associated with the 鈥楽ecurity Class,鈥 namely those persons who get to know about others without their own actions and knowledge being known.鈥
Barbara Simons, a highly decorated retired IBM computer scientist, former president of the ACM, and current board chair for Verified Voting, responded, 鈥淯nfortunately, I think the most likely scenario is that technically savvy people might be able to communicate privately, but most folks will not have that option. I hope I’m wrong… It would help if people would stop saying that privacy is dead鈥攇et over it. There is no law of physics that says that it is impossible to have privacy. We can have privacy, if that is what we as a society choose.鈥
Bruce Bimber, a professor at the University of California-Santa Barbara, wrote, 鈥淎t this stage, those who benefit from the market for personal information and data are well organized and have a great deal of momentum in the market. By contrast, there is little organization and few resources, comparatively, on the part of those seeking a new regulatory regime that would protect privacy. So, pressures on government at this stage are greatly imbalanced. It is impossible to make an intellectually responsible forecast for 2025, but we can certainly see that there are few prospects for comprehensive reform in the near term.鈥
Fred Zimmerman, of Pagekicker.com wrote, 鈥淭here are no market drivers to make it happen. Rather, all the market drivers are to make individual behavior as track-able as possible for consumer purposes, which inevitably means that governments can track people, too. The public will be much more accustomed to a default lack of privacy on the one hand and the need for strong cryptography or going off the grid to generate real privacy, but at a cost.鈥
Nick Wreden, a professor of social business at University Technology Malaysia, based in Kuala Lumpur, commented, 鈥淭his, for better or for worse, is a free-enterprise world, and tracking data enables companies to sell more. Just look at 鈥榙o not call鈥 lists today, with all their loopholes. The regulation was enacted, but we are all still getting calls at dinner. The elite will have privacy safeguards, while the rest of us will not.鈥
Karen Riggs, a professor of media arts at Ohio University, wrote, 鈥淟awmakers (of course, being funded by corporations) might grapple with the problem in various ways, but corporate interests are overwhelmingly powerful. It is also unlikely that government officials and employees will unilaterally back off their affront to personal privacy because of what is deemed 鈥榠n the national interest.鈥 …. A gathering storm is occurring in the realm of employer-employee relations. Among other practices, the bleeding of private Internet and communication technology (ICT usage) into the workplace is transforming the modes and scope of surveillance by employers. In less direct communication, corporate and private hacking (as well as government surveillance) will continue to creep into everyday ICT usage. Privacy protections will be Band-Aid measures. With each correction of technological vulnerability, corrupt influences find a new way to invade the personal sphere.鈥
Ebenezer Baldwin Bowles, founder and managing editor of CornDancer.com, wrote, 鈥淧rotection of personal information by the individual citizen, over-matched and out-maneuvered, is the propagandist’s illusion鈥攁 hard sell come 2025. No number of outwardly friendly personal security apps will enable the individual to outsmart the profit-driven determination of major corporate players and criminal cyber gangs, or overcome the intrusions into privacy and cynical threats to liberty from a menacing fascist state, bent on total control of a restive and displaced populous. The few who retain awareness will have realized the impossibility of privacy but will learn to strike a counterbalance through the sly creation and manipulation of multiple and diverse online identities. Everyone will be watching everyone, but no one will be certain of the actual corporeal identity of the visages on the other side of screens and holographic projections. For the many, participation in the Net will no longer be optional.鈥here will be no escape from the chipset, the camera, and the omnipresent PDA. The long-sought passive legion of worker drones will, at last, be fully mustered and brought under systematic control by the stock-holding elite and their handsomely compensated managers, engineers, analysts, planners, and enforcers. A sophisticated menu of online social and cultural diversions, delivered in the guise of entertainment and personal networking, will satiate the wage-earning citizenry, ensuring that the so-called 鈥榟aves鈥 remain blind to inequity among peoples and oblivious to the rapid diminishment of resources necessary to feed, house, and clothe the human race. Everyone vested in the system will have just enough to satisfy vague ideas of personal progress and opportunity…The mantra, 鈥榃hat have you got to hide?鈥 will have become commonplace criticism of anyone who stands against the all-powerful state in matters of privacy versus security. Not knowing our neighbors, and inculcated with deep-seated fear of 鈥榯he other,鈥 we, as a people, will view privacy as one of those things we had to relinquish to be safe from harm and secure in our hovels.鈥
Frank Thomas, a communications professional, wrote, 鈥淭he continuing influence of US corporations, the US administration, and the Chinese state with the then-largest digital user base, will inhibit effective protection of user privacy. The situation is just too good for these major players to leave individual privacy rights below the level attained with international telegraphy or postal services in the nineteenth century. Who could have imagined that private corporations demand, and get, the right to read your address book, just under the pretense to send 鈥榖etter鈥 advertisements (as smartphone apps often demand)? There will be a continuing struggle on privacy between countries with a historical experience of dictatorship and foreign occupation, such as the majority of European, African, Asian and Latin American countries, whose populations will demand strong privacy, and the few Anglo-Saxon countries with their Puritan and dictator-free experience, who see no evil in living digitally naked. I have nothing to hide, so the state (or a corporation) can look into my intimacy, if I get a favor for it.鈥
Francis Osborn, a philosopher at the University of Wales-Lampeter, wrote, “Governments and businesses are extremely unlikely to create a secure and trusted privacy-rights infrastructure because, where privacy rights and online marketisation conflict, the buying public [is] consistently ready to take a convenient option, which compromises the security of their data. There are, and will remain, a minority who wish to ensure the security of their data and privacy, ensuring the continued demand for such a secure and trusted system, but buying and selling personal data is such a large part of marketising otherwise unprofitable online services that a compromise by 2025 seems impossible.鈥
Dave Burstein, editor of Fast Net News, responded, 鈥淚n making decisions like this, especially around monetization, corporations with the money for lobbying too often dominate. The result is weak protection for individuals. Most of us will continue to prefer our sexual behavior unobserved and will not go naked in public. Short of that, the majority will take a, 鈥榃hat the ****,鈥 attitude toward privacy.鈥
Mark Nall, a program manager for NASA, responded, 鈥淭here may be the illusion of personal privacy, but there are two main drivers against true personal privacy. The first driver is corporate need to understand the customer. Business economics will continue to drive this. The second driver is national security. Lone actors are a significant threat now, and advancing technology will make them an even greater threat in 2025. Automated monitoring will be used to help prevent future crimes. There already is little or no expectation of privacy online. This will continue, so I see little change by 2025.鈥
Celia Pearce, an associate professor of digital media at the Georgia Institute of Technology, responded, 鈥淢y leaning is towards 鈥楴o,鈥 and here is why: For one thing, policy makers are largely clueless about the Internet. They have poured billions of dollars into cyber security from the perspective of cyber-terrorism and national security, including spying on Americans, but have turned a blind eye to many other aspects of the Internet that need attention. In my opinion, the biggest threat to privacy is corporations. If we do business with them, they take our private information and can do what they will with it, pretty much entirely unregulated. They can sell our information, pass it around to their other divisions, and so on. If we browse their websites, they can cookie us and track everything we do, again, unregulated. In addition, they can spam us without consequence. At this point, corporations are free to exploit their unlimited access to our personal information without any checks or regulation, and, sad to say, I am sure this will continue… My biggest concern about the Internet at the moment is cyber-bullying and hate speech, especially misogynistic hate speech towards women. I am a video games scholar, and it is well known that, when women go into networked video games such as聽Halo聽or聽Gears of War聽speaking with their natural female voice or revealing their gender through a name or other means, they get harassed, told, 鈥楾his game is not for you,鈥 and/or threatened with rape and so forth. And, anti-gay hate speech is so pervasive that it is commonplace. Women who speak out against sexism in the game industry are regularly threatened and harassed.鈥
Aziz Douai, a professor of new media at the University of Ontario Institute of Technology in Canada, responded, “The high economic and political stakes involved in dominating and controlling cyberspace will continue to prevent technology innovators from creating a more secure and 鈥榯rusted privacy-rights infrastructure.鈥 Users will be more jaded about online privacy because they will expect that it is the (huge) price they have to pay to participate in cyberspace.鈥
David Cohn, director of news for Circa, responded, 鈥淭he incentives are not aligned properly for this to occur. Publicity will be assumed; not just that it is assumed one is in 鈥榩ublic鈥欌攂ut one will assume that there could be 鈥榩ublicity鈥 around their actions. Privacy will be a privilege, and even in the act of being private, will be known. For example, I know if somebody is using Snapchat, they are having conversations that are private. Because privacy requires action, one cannot inconspicuously be private.鈥
Tom Jennings, a respondent who chose not to share additional identifying details, wrote, 鈥淚t will never happen… My guess is that the Internet as we know it鈥攐pen protocols鈥攚ill be replaced by inter-linked proprietary networks controlled entirely by corporate interests with a modicum of regulation and an extra heaping of government security infrastructure, a la NSA’s data extraction/warehousing. Government now, and probably for another decade or two (if it is not yet already permanent), has far more pressure to serve the needs of 鈥榖usiness鈥 (a misnomer: multi-national corporations, i.e., Walmart, et. al, are hardly 鈥榖usiness鈥 in any historic sense). 鈥楢pps,鈥 as opposed to flexible multi-purpose, adaptable programs running on general purpose computers (laptops, etc.), will further ensure the death of any egalitarian use of the Net; 鈥榓pps鈥 turn Net services and their human users into 鈥榬ead-only鈥 users consuming information produced by content-providers…[I]t is not like 鈥榩rivacy鈥 ever had a hard definition; it was always contingent upon the loss of some 鈥榓ssumed鈥 part of culture. Privacy generally meant, ‘I assume no one is looking.鈥 Corporations are exploiting components of human interaction trivia that went unexamined, i.e., tracking individual incidental purchases, or 鈥榝ollowing you out of the store鈥 with identity tracking, etc. Whatever happens, there will be less self-control over the consequences of our personal actions, calling that privacy, or not, is another issue.鈥
John Anderson, director of broadcast journalism at Brooklyn College, wrote, 鈥淚 just do not see that the political or economic will be there for it, unless there is a massive sea change in the way our political system works. I fear we will be living in a world where biometrics will be a common thing, and privacy will be a premium luxury commodity. This is nearly impossible to imagine, as changes in this regard are happening within generations. By and large, my students see privacy as an esoteric thing that does not really have any bearing on their lives, and that scares me.鈥
Victor Bahl, director and research manager for Microsoft Research, wrote, 鈥淭he bar for what is considered private, and for what is not, will be different from what it is today. Citizens will continue to stress about the information technology and can infer from what appears to be random and uncorrelated pieces of data. Laws will complicate the usefulness of the technology, so people will be confused about what they are giving up. Different form-factor devices will make it harder for users to understand what they are compromising.鈥
Larry Press, a writer, consultant, blogger, and part-time professor, said, 鈥淪ecurity and privacy will evolve, but they will not come to a stable conclusion for several reasons: first, 鈥榬ight鈥 and 鈥榳rong鈥 are subjective鈥攐ne person’s privacy for freedom fighters is another person’s terrorism. Second, people willingly trade privacy for free services like those provided by Google and Facebook; that also gives those companies power to influence legislation. Third, technology鈥攚hack-a-mole鈥攚ill continue to evolve. My guess is that people will be less concerned about privacy by 2025鈥擨 teach, and my students are pretty much indifferent.鈥
Gary McGraw, the CTO for Cigital Inc., known as a father of software security, wrote, 鈥淭hough all stakeholders will聽want聽this to happen, it will not. The government will overreach and underperform in all domains, using private industry to justify and amplify its actions. In general, the populace will remain captivated by functionality and will not care about lack of privacy, surveillance, or the tradeoffs that come as a price for 鈥榮ecurity.鈥 There will be more awareness, more worry, and about the same action by 2025.鈥
Karl Fogel, a partner with Open Tech Strategies, and president of QuestionCopyright.org, wrote, 鈥淚 expect user privacy to be in about the same position in 2025 as it is now, for several reasons. First, businesses that provide online services often have a direct anti-privacy interest; they make their money by selling facts about their users鈥攁dvertising being the most obvious use, but not the only one. Second, in online services, there is an inherent tradeoff between privacy and usability: the 鈥榰ser experience鈥 provided by an online service is often better the more the service knows about that user’s life. (This is not to say that privacy is an unworthy goal, but rather that people sometimes want contradictory things.) Third, similarly to the above, there is a security/convenience tradeoff inherent in any software application. Software tools exist right now that offer communication free of surveillance, and in some cases, even free of detection. But, most people do not use them most of the time because those tools inevitably make communication harder for the legitimate interlocutors (after all, whenever there is a security feature that 鈥榙oes not鈥 involve any inconvenience, it would already be incorporated as a matter of course, thus establishing the new baseline from which the security/convenience tradeoff begins again). Fourth, governments’ desire for surveillance capabilities will not go away, and neither will their strategy of drafting Internet-based services into the surveillance network.鈥 Nothing about the passage of time changes any of these dynamics.鈥
Marc Weiner, a professor at Rutgers University, wrote, 鈥淭he Internet’s present-day commercial norms and physical infrastructure [assumes] a very elastic sense of privacy. Despite some early holdouts for a free and unregulated Internet, it was quickly monetized, and since the only things that actually move around on the Internet are data, it was data that was monetized. And, in order to monetize data, it was necessary to render conventional understandings of privacy elastic; indeed, Facebook’s use of private data is the very best example of this phenomenon. This policy of elastic privacy is now so deeply embedded in the praxis of the Internet that path dependency pushes it to expand in like form.鈥
Theme 2) There is no way the world鈥檚 varied cultures, with their different views about privacy, will be able to come to an agreement on how to address civil liberties issues on the global Internet.
Per Ola Kristensson, a lecturer in human-computer interaction at the University of St Andrews, UK, responded, 鈥淏y 2025鈥 there will be intense pressure by the general public to legislate in order to protect people’s privacy on the Internet. However, legislation will not be completed by 2025, as legislators will still be waiting for an industry-driven, privacy-rights infrastructure to be developed. The development of this infrastructure will be delayed because of an inability to agree on several fundamental issues due to competing business interests, such as a fear of standardization damaging profits for leading advertisement networks, and an inability of privacy advocates and advertisement networks and other industries profiting from profiling people to compromise. Politically, there will be serious concerns raised about how the United States risks losing its dominant position in the Internet business by legislating too harshly, as leading advertising networks by Google, Facebook, LinkedIn, and other US-based IT-companies will be even more dominant and an even bigger industry than it is today. It is likely educated people will be more reluctant to share information on the Internet, as the ability to de-anonymize people on the Internet will be much greater.鈥
An Internet engineer and machine intelligence researcher responded, 鈥淚 expect the continued balkanization of Internet governance, with different policies imposed for different reasons at the national level. Some countries will choose to favour individual privacy and information security. Others will take a laissez-faire approach. And, others will impose severe censorship and access restrictions for various well-meaning or misguided reasons. I expect established business and national security interests to continue to disrupt any attempts for global governance with regards to individual privacy and information security. It is likely that continued disclosures of privacy violations, particularly disclosures that lead to human rights violations, will raise public concerns, perhaps even to the point where citizens of democratic nations collectively express that concern by voting for government representatives who are equally concerned. It is equally likely that the public in wealthier, democratic nations will simply accept the lack of privacy, based upon the rationalization that it does not affect them personally.鈥
Stuart Chittenden, the founder of the conversation consultancy Squishtalks, wrote, 鈥淭he outcomes will revolve around the tensions between global cultures (i.e., privacy-inclined Europe, compared to the indifferent and open United States, to controlled and censored China, Russia, etc.); economic systems (i.e., free-market capitalism and quasi-socialist economies); and sociopolitical value systems (i.e., US Republican, versus Democratic, policies); as well as a simple lack of awareness and, indeed, apathy, among much of the Western world, especially the United States, when it comes to the balance between corporate messaging and the reality of Internet-based applications and tools. Public norms will be largely indifferent, with isolated groups (i.e., ACLU, consumer advocates, Snowden-esque supporters, etc.) offering cautionary, yet shrill, messages that will be ignored by the vast swathe of the media.鈥
Shahab Khan, CEO of PLANWEL, a nonprofit organization aimed at closing the digital divide, wrote, “This issue is too diverse for all countries to agree. Superpowers always have their own interests to look after. The developing world might agree. There would be a clear divide.鈥
Laurent Francois, executive creative strategist for RE-UP, said, 鈥淚 cynically think that, in 2025, we will experience big 鈥榖locks鈥 of interfaces, probably gathered around political or cultural objectives. As there will be this sort of oligopolistic digital world, I doubt there will be a consensus between nations with very versatile geopolitical and technological strategies. There will probably be more digital worlds: we might see new, 鈥榦ff the grid鈥 systems, which will co-exist and live out of infrastructures initially shaped by governments. In terms of business relationships, consumers will probably value a minimum standard of privacy. But again, as it is already a very complicated mind game (just look at what we already accept when we install a Facebook app!). I am not sure that the general public will shift its attitude if the consumer experience satisfies them. I guess that it is going to become tougher.鈥
David Allen, an academic and advocate engaged with the development of global Internet governance, replied, 鈥溾橳he Internet鈥 is, of course, a global phenomenon. While some nations may likely produce, by 2025, such a trusted infrastructure, it seems clear that other nations most certainly will not. Europe seems likely to continue strongly on the privacy front. On the other hand, totalitarian regimes have too much at stake to follow such a dictate. Will the United States produce such an infrastructure internally? The United States moves incredibly slowly on the things. To predict, for 2025, is a chancy bet. Will some global governance structure arise to produce such a global infrastructure? That seems unlikely, particularly with the tension between the West and pointedly non-democratic states.鈥
Theme 3) The situation will worsen as the Internet of Things arises and people鈥檚 homes, workplaces, and the objects around them will 鈥榯attle鈥 on them. The incentives for businesses to monetize people鈥檚 data and governments to monitor behavior are extremely potent.
Anita Salem, a design research consultant, wrote, 鈥淕overnment and industry will both exert strong pressures to decrease our privacy. Government will continue to strengthen data mining efforts on private citizens and push for encryption keys in the name of 鈥榮ecurity.鈥 Industry will continue to put profit over ethics and create even more unusable privacy settings and will utilize our data for subtle, and not-so-subtle, purchase and market manipulations. The lack of privacy will be taken for granted. The public will not realize the power of psychometric data mining and analysis, which will be used by the privileged to shape opinion and influence laws. Public opinion will be tailored almost instantaneously based on aggregate data mining of online activity. Behavior will be more homogenized due to the ability to network cameras and computers to observe and identify aberrant behavior. New technologies and social systems will be established that are counter to this anti-privacy culture, and these hackers may exert a disruptive force.鈥
Dean Thrasher, founder of Infovark Inc., wrote, 鈥淭he slow erosion of privacy online is a classic 鈥榖oiling the frog鈥 problem. It is hard to imagine a crisis of privacy that would force regulators or lawmakers to take a strong interest in establishing and protecting privacy rights. As for technologists, there are compelling technical and financial reasons for making privacy protections as weak as possible. The technical reason is that privacy is a 鈥榳icked problem,鈥 an intersection of social norms, tacit guidelines, and accepted practices that are difficult to codify. Managing complex security and privacy rules regarding data is an expensive and error-prone task, and most companies will avoid it if at all possible. The financial reason for avoiding it is simple: Most websites and applications are funded by advertising and commercial applications that have a strong interest in knowing as much about current and potential customers as possible. In response to the weak online privacy regime, most Web participants will grow used to managing multiple profiles. They will put forward different public views of themselves in different contexts, and others will come to respect the implicit boundary lines between these profiles.鈥
Alf Rehn, chair of management and organization at Abo Akademi University in Finland, wrote, 鈥淲hilst I would love to think that we will be a more advanced society privacy-wise, I am a cynic when it comes to this. As privacy is becoming increasingly monetized, the incentive to truly protect it is withering away, and with so much of policy run by lobbyists, privacy will be a very expensive commodity come 2025. Sure, some of us will be able to buy it, but most will not. Privacy will be a luxury, not a right鈥攕omething that the well-to-do can afford, but which most have learnt to live without.鈥
Christopher Wilkinson, a retired European Union official, board member for EURid.eu, and Internet Society leader, said, 鈥淭his question contains contradictions which belie the 鈥榊es/No鈥 response. I do not accept that ‘compelling apps’ emerge from consumer tracking and analytics. I think that these techniques have nothing to do with the user experience, but rather are designed to customise advertisers’ opportunities. I would prefer to pay more for an Internet that is free of advertising. In Europe, they will not differ significantly from what they are now. The Internet operators should adapt their offerings to the privacy of individuals and to the law. With respect to apps, etc., ‘privacy by design’ should be the norm.鈥
David Ellis, course director for the Department of Communication Studies at York University in Toronto, responded, 鈥淏ig corporations will always want more confidential data from customers, especially those in the targeted-ad industrial complex, since increasingly intrusive data-mining is the hallmark of success. These motives will apply less to firms whose business is not ad-supported, but instead, based on selling content and apps (and other digital retail goods). Yet, this distinction is by no means hard and fast, since lots of developers have shown they are not above deceiving end-users about their actions… By 2025, these trends are likely to be exacerbated by the appification of the Web and the growth of the Internet of Things and the far greater degree of intrusiveness they will enable.鈥
Andre Brock, a survey participant who shared no additional identifying details, wrote, “I foresee that the expansion of personal information collection will continue to be exploited for profit and for ‘national security.’ While I am tarring smartphones with a heavy brush, thanks to their proximity to our person and status as genius loci of our social spheres, I am also concerned about the number of ‘quantified-self’ devices (and clothing), along with the incursion of the Internet of Things in our homes (i.e., the Nest thermostat, Internet-connected refrigerators, and smart toilets)… These devices and appliances are not yet infrastructure, but given continuing trends in low-power CPU design, I am convinced that we will continue to populate our domestic spheres with information gathering devices, and I have yet to see a considerate policy protecting our information access rights.鈥
Brad Berens, a senior research fellow at the USC Annenberg Center for the Digital Future, wrote, 鈥淐itizen/customer/consumer/user privacy in the United States is kind of like soccer: it is the topic of a future that is never going to show up.鈥
Mark Andrejevic, a university professor responded, 鈥淲e are embarked, irreversibly, I suspect, upon a trajectory toward a world in which those spaces, times, and spheres of activity free from data collection and monitoring will, for all practical purposes, disappear. We will continue to act as if we have what we once called 鈥榩rivacy鈥欌攂ut we will know, on some level, that much of what we do is recorded, captured, and retrievable, and even further, that this information will provide comprehensive clues about aspects of our live that we imagined to be somehow exempt from data collection. We are already doing this鈥攎any of us use email as if it is private, in the way that written correspondence or face-to-face conversations were private, even though we know that commercial entities, the state, and, in many contexts, employers, have comprehensive access to it. Increasingly, we will find our ability to preserve this illusion challenged, and I suspect we will adjust to these changes the way we have already adjusted to Gmail, etc. This is not to say that there will not be resistance to increasingly comprehensive monitoring, but I suspect that conceptions of privacy will be replaced by concerns over various forms of injustice and abuse, perhaps even over particular forms of entrenched power.鈥
Theme 4) Some communities might plan and gain some acceptance for privacy structures, but the constellation of economic and security complexities is getting bigger and harder to manage.
Sean Mead, senior director of strategy and analytics for Interbrand, wrote, 鈥淢ost people will ignore, or never appreciate, how exposed they are. There will be a branded program to represent best privacy practices, but it will be deliberately ineffective. A separate network will exist for those with a commitment to privacy; the network will lack the full functionality of the Internet and only be compatible with a limited number of sites. Expectations for privacy will be narrowed, but many will still be surprised by pictures and videos among friends going viral, in situations never contemplated at the time of capture.鈥
An anonymous respondent replied, 鈥淔or one, there will not be 鈥榦ne public,鈥 nor 鈥榦ne network.鈥 There will geo-publics with different rules (China, Napoleonic-dominated Europe Tradition, military-industrial-United States, etc.). Secondly, these geo-publics will have separate networks, and sub-partisan groups will have separate networks in those geo-publics (think darknets). Substantial portions of the world will assume they have no privacy, and in fact, will construct apps, appliances, and graphs based on that.鈥
Andrew Nachison, co-founder of We Media, wrote, 鈥淚 needed a third choice: 鈥榊es, but鈥︹ I have no doubt that policy makers around the globe will update privacy laws. But, they will not be uniform, or uniformly applied, and they will trail commercial and non-governmental innovations. Businesses will continue to seek new and better ways to track and persuade consumers to make purchases, as well as to manage risk. Governments in democracies will remain conflicted between the interests of citizens and those of businesses that drive economies and politics; and, governments in dictatorships, so long as they survive鈥攁nd like those in democracies鈥攚ill depend on surveillance technologies to track and suppress dissent. I favor stronger protections for privacy. I expect tech innovators to be the primary obstacles and providers鈥攁nd I do not think policy makers will lead or create the infrastructure. I suspect we will see more inconsistencies and schizophrenia鈥攃ontinuing erosion of expectations of privacy for communication and digital experiences鈥攁s we see today with young people who presume their digital lives and 鈥榲apor trails鈥 are public, or tracked by someone, but they do not fully appreciate what that means; and, at the same time, older people, who instinctively distrust government, fear for the safety and success of their children and worry about who has access to their data streams, especially their electronic health records.鈥
Nigel Cameron, president of Center for Policy on Emerging Technologies, based in Washington, DC, wrote, 鈥淭his will be turbulent. A language of privacy has yet to be properly developed, which is why, so often, people seem unconcerned. No business will prosper without consumer confidence.鈥
A professor at Aoyama Gakuin University, in Tokyo, Japan, wrote, 鈥淚t is technically impossible to create such an infrastructure because it is impossible to attach strings to data. Once you pass the data to somebody else, you just have to hope they will use it they way they told you they would. What can be done is to have stricter laws for privacy, but even that just leads companies to create longer small-print privacy statements, which nobody reads anyway. People will understand more about privacy implications of their actions on the Internet, but they will still ignore a lot of it. Also, there will be new technology that will make things more difficult to understand yet again.鈥
Brittany Smith, a respondent who did not share a professional background, wrote, 鈥淚t will be impossible for policymakers to create a popularly accepted privacy-rights infrastructure that is trustworthy without intensive collaboration and cooperation among major corporations and public agencies such as the NSA. This will require a large cultural shift, both within these organizations and amongst the greater public. Very few citizens are aware of what is at stake in this dialogue and are not in a position to organize and advocate for their rights. I believe a trusted organization will need to emerge that can help to educate the public and work across sectors to develop a secure infrastructure. Cyber-security will be the most important issue of the upcoming decades. People will become more aware of things like passwords and their online identities. Clicking 鈥楰eep me logged in,鈥 and, 鈥楻emember me,鈥 and, 鈥楽ave this password,鈥 will no longer be an option. I believe that, in the future, smartphones, wallets, and electronic devices will have built-in hardware to make them more secure, and more software solutions to create random, secure passwords that are changed frequently will become available.鈥
Kelly Baltzell, CEO for Beyond Indigo, wrote, 鈥淭he definition of privacy is undergoing change. What we considered privacy in the past is gone. In a sense, we are moving to a more open society, where everything can be tracked and shared. This really is a full loop back to the days of the small town, in which everyone knew everyone’s business. The more we rely on devices, the more tracking will become a natural outcome. Data, devices, and information are all tools. How we use these tools is the key. People have gladly given power to those who would choose to abuse it because they get captivated by the device. The devices create pleasure (studies have shown the 鈥榩ing鈥 of a smart phone text hits a pleasure center), and people shrug and say, 鈥榃ho is searching for me anyway?鈥 Until people choose to take back control over their thoughts and actions, online privacy will be a non-existence… Most people do not care. They are completely unaware of how much of their lives are tracked and are stunned when they find out there movements can be tracked. By 2025, this will be the norm, unless people decide to change. I hope they change, but in reality, it is looking bleak that it will happen. It is time for people to learn they have the power to make choices.鈥
Paul M.A. Baker, associate director at the Center for 21st Century Universities (C21U) at the Georgia Institute of Technology, predicted, 鈥淭here seems to be a variety of dimensions to the idea of trusted privacy-rights infrastructure. Policy makers and technology innovators do not necessarily have the same objectives, and while individuals may desire or expect secure, private information flow and transactions, there are most likely to be trade-offs that are reluctantly accepted. 鈥楴ational security鈥 will continue to be the justification for monitoring of information flows, justified by regulators, and the objective of monetizing or generating resources will drive the erosion of individual data privacy from the private sector side. I see at least two alternative scenarios: first鈥攊ndividuals beginning to abandon expectations of privacy, at least the way that we current expect it, and the development of workarounds such as synthetic constructed identities that will splinter the data envelope attributed to individuals鈥攐r, second鈥攖echnologies that allow alternative networks of transactions (grey nets) that straddle legal and 鈥榦fficial鈥 and illegal or unofficial nets.鈥
Stacey Higginbotham, a Texas-based technology writer, and frequent blogger for GigaOM, commented, 鈥淐onsumer data is so valuable in aggregate to corporations and for policy (and so cheap, from an individual perspective), that we will get paper tiger regulations that appear to protect individual data, while giving over aggregate data that is not supposed to be personally identifiable; however, that data will be easily tracked back to an individual, though we may have more protections in place that mean governments need a warrant to do so. When it comes to redlining and price gouging based on that information, I expect we will have to see some lawsuits, as opposed to laws. Congress will not go there. In terms of security, we will see some fines that will influence companies to build better security into their products from the get-go, but they will be circumvented. Right now, most companies are not thinking about that at all, so it is low-hanging fruit to start. People will be accustomed to being monitored, and it will take increasing amounts of technical savvy and paranoia to remain untracked. I believe social mores will relax on the job-finding side, so your drunken Facebook pictures or trips to strip clubs will be less harmful from an employment perspective, although possibly still something to be held over someone’s head, if necessary. People will rebel if their personal spaces, such as their homes, are broadcast online, but they will ignore it if that same information is available with a warrant, or whatnot.鈥
Ed Lyell, a college professor of business and economics, and early Internet policy consultant dating back to ARPANET, observed, 鈥淎s much as one tries, it is likely to be impossible to keep ahead of hackers, independent and national state-led. The economic incentives are great, and it is technically very easy to track everything, such as Twitter having more metadata than the actual 140-character messages. My young college students seem unconcerned with maintaining their privacy, so there will be less and less political pressure to control privacy access.鈥
An attorney working on digital issues for the US federal government responded, 鈥淚 find it hard to believe that there will not, in 2025, still be a continuum of beliefs about privacy rights, from those who will trade their grandmother’s social security number for a chance at a free cheeseburger, to those who will do their ever-more-difficult best to stay off the grid out of privacy concerns. Whatever the norms鈥攁nd I do believe that there will be a far more robust security and privacy infrastructure in place鈥攖here will be those at both ends who object to them, and those who subvert them for political, ideological, and financial gain. By 2025鈥攁s in 2014鈥攖here will be little聽reasonable聽expectation of privacy. I am concerned that if that remains the legal test, there will be little legal protection of privacy. I am extremely skeptical of any possibility of a legislative solution. I am somewhat more optimistic about a technological solution. In addition, the privacy and security implications of online life are only beginning. As more and more of our lives and interaction are online, more and more data will be stored and there will be more and more ways to access, assess, and monetize it.鈥
Themes commonly found in the answers of those who say they expect there聽will聽be a widely accepted privacy infrastructure by 2025
Theme 1) Citizens and consumers will have more controlthanks to new tools that give them the power to negotiate with corporations and work around governments. Individuals will be able to choose to share personal information in a tiered approach that offers varied levels of protection and access by others.
Craig Newmark, founder of Craigslist, wrote, “If capable people of good will鈥攐n both policy and tech sides鈥攃an connect, then this can happen.鈥
Charlie Firestone, executive director of the Aspen Institute Communications and Society Program, responded, 鈥淧ersonal identity and privacy will likely be more secure through user-centric identification techniques. Nevertheless, it is, and will continue to be, an electronic arms race between those who will find ways of using personal information to target products and service to customers/users and those who will find ways of protecting and 鈥榦wning鈥 personal information on behalf of the user. First, there will be greater awareness of the uses to which one’s private information will be put, and second, there will be better tools to own and/or protect that information.鈥
An Internet researcher and entrepreneur said, 鈥淚 see a convergence of identifiers, where our online and offline identities, payment methods, and devices become connected (if not centralized) in ways different than our de-coupled current state. I believe the connection of these identifiers will force the creation of more stringent rules and protections regarding data protection. Within this framework, technology builders can then develop approaches that appease the many regulatory agencies. Privacy evolves slowly. We will laugh about how ridiculous Google Glass was.鈥
Laural Papworth, a social media educator, replied, 鈥淧olicymakers will not have a role, but technology innovators now have an extremely strong customer sector that speaks back. Products that damage fidelity will be destroyed by mass word-of-mouth media before they get too far. Rights will be managed, not because of any ethical behavior, but because not to will be bad for business. Consider Google Plus making privacy such a critical part of their social network to counterpoint Facebook’s perceived lack of privacy. Privacy was a short-lived, post-industrial experiment. The global village will always win against privacy. Privacy was used to divide and separate individuals from each other to weaken them. As we enter back into the village, privacy naturally disappears against convenience and the human need for connection.鈥
Kevin Jones,聽founder of Good Capital, SOCAP (social capital markets conference) and Impact Hub network, replied, 鈥淧latforms created in the sharing economy will enable average citizens to aggregate and make felt their collective power. Car sharing, room sharing, tool sharing, etc., and nonprofits that marshal people who believe in this new paradigm, will exert their power. Collective wisdom will prevail. The people will be in more control. Corporate personhood will be reined in because the corporation will be much less central in a world past peak oil as we transition to a new future. That is the future I am aiming at and designing for.鈥
Deborah Lupton, a research professor at the University of Canberra, Australia, commented, 鈥淒igital technology users will become increasingly aware of how their metadata and data are being used (or misused), and there will be pressure for them to be able to exert greater control over how their data are being used. There will be a greater awareness of the relationship between digital technology use, the production of personal information via this use, and the importance of knowing what happens to these data and having control over them. Consumers will be more aware of the tradeoffs between the benefits they gain from using digital technologies and the privacy issues that this use may entail. Privacy concepts may incorporate data control concepts to a greater extent than at present.鈥
Paul Jones, a professor at the University of North Carolina and founder of ibiblio.org, responded, 鈥淲hile the main part of privacy and security is peace of mind that can only be secured by strong social norms, the continuing efforts to engineer support for privacy and security will receive sustained interest and funding. In short, it will get better because we want it to get better鈥攁nd we will understand what makes it better for all of us. Some of this perception of betterness may solely be the product of exhaustion and resignation, however. During the previous century of urbanization, we constantly complained of alienation and isolation. No one knew anyone quite as well as we did when we were in small towns. Now, like it or not, we are having to relearn the social behavior of small towns: how to cooperate, tolerate, or just ignore differences. Frankly, we were not so great at all of that when we were in small towns. Now, we get another chance to try to live like a Family of Mankind.鈥
Raymond Plzak, former CEO of the American Registry for Internet Numbers, and current member of the Board of Directors of ICANN, wrote, 鈥淎ll of the pieces are in place today to do this. What is really lacking is the international cooperation to do so, while, at the same time, not being seen as surrendering sovereignty by, perhaps, having to modify existing practices, polices, and laws to be a part of the global system. If this is done in the right manner, so that individual rights and privacy are protected, compelling content and apps will come on their own accord. Private data, whether it be personal information, pictures, or intent that is being surrendered in the social media world today, will be shared more conservatively in the future until such time as anti-predator and anti-exploitation mechanisms can be put into place, along with rigorous enforcement meted out to violators. This will have to be done on a global cooperative scale.鈥
Isaac Mao, chief architect of Sharism Lab, wrote, 鈥淭he Snowden case gave people a strong alert that the Internet is far from secure and privacy-proof. And, China’s Internet cyber attack and Great Firewall system taught all of us that the Internet is not stable, it is not personal, and it is not decentralized; however, with such strong senses, Internet users, innovators, and entrepreneurs will strive to make more new technologies to improve on that. New, disruptive architectures or tools will emerge due to the alerts Snowdens and governments give us. Privacy will be less sensitive as more technologies can be helpful to individual users, and at the same time, privacy theft will be more easy to be tracing if abuses happen.鈥
Adrian Schofield, manager of applied research for the Johannesburg Centre for Software Engineering, wrote, 鈥淭he policy makers will lag behind the technology innovators, but the demand for an acceptable, workable global network will drive the required solutions. Most people will accept that they live 鈥榦pen鈥 lives of little interest to 鈥榮noopers鈥 of any sort. There will be ways of securing private data.鈥
Neil McIntosh, a British journalist working for a major US news organization, wrote, “Even in 2025, there will be a tension, because I would expect development to continue rapidly on both sides of the privacy fence, between businesses keen to acquire and monetize personal data, and a public increasingly wary of handing it over without sufficient reward. An important third party is government: recent revelations about what information it collects may have a profound impact over time on some consumers’ willingness to be tracked 鈥榠n any way鈥 online. But, despite this ongoing arms race, I would expect the privacy infrastructure to be built by the market because the consequences of failure are huge. We will start to hand back the digital revolution’s gains in knowledge, productivity, and prosperity if this is not sorted out. Maybe privacy becomes something you pay for by 2025; sure, your phone can give you personalised recommendations on nearby restaurants right now, but if it is for free, you need to tell the world where you are and let people market products and services at you鈥攂ut, if you hand over 拢5 a month鈥︹
Fred Hapgood, a self-employed science and technology writer, responded, 鈥淭he ability of machines to recognize and make inferences from features of everyday life, online and off, will continue to improve, and access to those abilities will get cheaper. As they do, new privacy issues will come up over and over again. By 2025, I suspect that support for imposing a much greater degree of transparency on governments and other information consumers will be much greater.鈥
Mark Johnson, CTO and vice president for architecture at MCNC, the nonprofit regional network operator serving North Carolina, wrote, 鈥淭he IETF will incorporate encryption into default standards, greatly improving security and privacy. There will continue to be a tug-of-war between the desire for various types of 鈥榓nalytics鈥 and privacy concerns, though. Privacy norms have been moving, and they will probably continue to do so. People are more aware of the issues, and I expect the tools available to help individuals take control of their privacy will improve over time.鈥
Mike Roberts, Internet pioneer and longtime leader with ICANN and the Internet Society, responded, 鈥淭his landscape is littered with ignorance and misinformation. Despite that, there will be great progress in strengthening Internet security because politicians and tech leaders are finally in agreement that it must happen. The extremes of political views on the subject will continue to be unhappy, with lack of perfection of implementation of their views. The perfect is the enemy of the good, etc. There was an interesting blog comment the other day pointing out that 18th and 19th century immigrants seldom had any personal privacy where they came from. The wide-open spaces of America allowed the creation of 鈥榩rivate鈥 spaces for individuals, and we continue to value that. But too much of the privacy space has been consumed by silly and prudish mores related to sex. The center point of social views has, and is, moving in a more open direction. Like other social areas, there is a deconstruction/disintermediation process going on that is energized in many ways by Internet social media. The social/political space will continue to display tension between communitarian and libertarian views despite technology evolution.鈥
Tim Bray, an active participant in the IETF, and technology industry veteran, wrote, 鈥淚 am looking primarily to the policy makers, and policies differ from nation to nation. In those nations that have a civilized respect for their citizens鈥 rights, there will be a policy framework that enables all network communication to be private-by-default; law enforcement access will require a fairly traditional judicial process quite unlike the blanket-blessing the NSA currently seems to operate under. I am certain there will be other nations where pervasive abusive surveillance will be the norm. I am confident that the engineers can connect the technology dots, given a solid policy foundation to work on. I hope we have a keener appreciation that privacy is a basic benefit of modern civilization, much like indoor plumbing and elections.鈥
Lee McKnight, a professor of entrepreneurship and innovation at Syracuse University, responded, 鈥淏2025, there will be substantial progress in developing and deploying new overlay trust, privacy, and security architectures and systems needed by business, government, and the mobile device-loving public. These can provide end-to-end privacy and security far beyond the crude patches to the wide-open Internet. As big data requires assessing lots of data dynamically, to judge patterns and make decisions, the public will, by 2025, understand that, if it buys into ‘free’ digital services, it is making a trade, for re-use of鈥攁nonymized and encrypted鈥攊nformation about themselves and their digital habits. On the other hand, government agencies鈥攊n general鈥攚ill also understand the limitations on what is accepted and what is not. And then, there is the intelligence community, both in the United States and around the world, which will accept certain levels of constraint, as the cost of doing business 2025. At least publicly. So, the public will be, more or less, cool with the balance struck, which, by 2025, will be majority digital natives and well aware of the choices and trade-offs they must make every day.鈥
Garland McCoy, president and founder of the Technology Education Institute, said, 鈥淚n those countries with 鈥榦pen gardens,鈥 the customer rules, and those who wish to offer up their personal information in exchange for better services鈥攎ore targeted services鈥攚ill have that opportunity, and for those who wish to travel the Internet in a private, secure way will be offered the ability to do so (with the understanding that the government, should they wish to, can dedicate a mainframe to cracking your key, which would cost them a good bit of time and money per individual, per packet). So, there will be choice鈥攔eal choice鈥攊n the 鈥榦pen garden鈥 countries. In the 鈥榳alled fortresses鈥 countries, well, there will be no choices. If there is a market for privacy, real privacy, then companies will provide it. You will be able to choose your level of privacy or public engagement. Obviously, as it is in the real world, those who have the money to buy real privacy and security for themselves and their family will have it, and those who do not have the money, or do not want to invest in that level of privacy or security, will have to do with what is generally offered and available.鈥
Dan Farber, editor with CBS Interactive, replied, 鈥淚n the next decade, the various factions will move toward a more secure, popularly accepted, and trusted privacy rights infrastructure. It is in the interest of companies interacting with customers online to make them feel more secure. It will not be perfect or totally trustworthy. With software, there are too many ways for governments, corporations, and individuals to subvert privacy policies and controls for self-interest. In addition, far more personal data is coming online, which makes the problem even more difficult to manage. Unless human nature changes (which it will not), we will not be able to have full trust in whatever privacy infrastructure is developed.鈥 As we have seen with the NSA revelation, no data is safe from those who want to access it; however, that does not mean great efforts will not be made to provide more secure privacy. Certainly, Facebook Google, Apple, Amazon, etc., will make every effort to make their customers believe they are trustworthy stewards of privacy.鈥
Elizabeth Albrycht, a senior lecturer in marketing and communications at the Paris School of Business, replied, 鈥淚 think that the demand will be such that a certain level of privacy will be guaranteed via policy. It will not please everyone. Consumers, corporations, and governments will all have to give something up. There will be tight time frames attached to privacy as well. Privacy will be negotiated and commoditized. We will have some free guarantees (human rights-level) and then pay for various other levels. We will not assume it is like a public good (air), but it will have a measurable (quantitative) value that we have negotiated via privacy markets. None of us will be happy with the situation, but that is good. It means that control will not be in only one player’s hands.鈥
Randy Kluver, an associate professor of communication, and global Internet researcher based at Texas A&M University, responded, 鈥淪uch a framework will indeed be created. I am not sure that it will come about by policy makers, but rather, the market will demand that something be created. I do think that technology innovators will be part of this process, but I am not sure that it will, or should, be involved in some way with the regulatory process and bureaucracy. I think we all, right now, are trying to come to grips with the implications of the Snowden revelations. We will not be able to roll back the current level of surveillance, but we will come up with a new, lower standard for personal privacy and, hopefully, do a better job of policing the surveillance mechanisms.鈥
Giuseppe Pennisi, an employee of the Economic and Social Council of the Republic of Italy, responded, 鈥淚 trust that, in 2025, there will be good balance between personal privacy, secure data, and apps. The key issue is, in my view, different: will Internet achieve a level of externalities and interdependence similar to that of previous innovations (i.e., mechanics, electricity)? It seems that, after a very innovative first ‘phase,鈥 research now concentrates on personal returns (i.e., enjoyment), rather than on social returns through externalities and interdependence. In Europe, the trend would be towards European regulations and closer coordination among European privacy authorities.鈥
Olivier Crepin-Leblond, managing director of Global Information Highway Ltd. in London, United Kingdom, predicted, 鈥淒espite a lot of push and pull in the lead-up to 2025, policy makers will eventually get the right balance between personal privacy, secure data, and compelling content and apps that emerge from consumer tracking and analytics. That said, there will be some periods until then, in which personal privacy will appear to have been lost forever. Only through the continuous will of privacy advocates and their supporters will governments step in to protect their citizens and regulate privacy. By 2025, blatant cases of abuse of personal privacy will have been so publicised that the public will be much better informed than it is today. People might still be intent on giving out personal information, but they will want to know why and how it will be used鈥攁nd have the means to make sure companies use it as they have declared they would.鈥
Kath Straub, of Usability.org, responded, 鈥淏y 2025, biometrics will allow unique and secure identification of individuals. Apps and content will continuously tailor themselves to the needs and whims of the individual. We will interact continuously with our technology, but it will take a very different form. We will not need to hold it in our hands, for instance. The way we 鈥榟old鈥 and convey our identity will change, but the norms will not be that different.鈥
Andrew Rens, chief counsel for the Shuttleworth Foundation, replied, 鈥淚 answer this as 鈥榥o鈥 for policymakers and 鈥榶es鈥 for technology innovators. Policymakers will likely fail in this task, unless there are changes to democratic institutions that make them more responsive to citizens and less to proxies of multinational corporations. It is not always possible to code around bad laws and policies. Lawyers and activists will likely manage to carve out policy and legal space for innovation. Then, technology innovators will create the technological basis for people to have power over their personal information. In turn, control by people over their own information and other aspects of their communication will enable the trust necessary for businesses, especially smaller businesses, to make money via the Internet. There is no shortcut to monetization; it follows from giving people power over their information. In 2025, public norms will regard privacy as extremely important. Every institution and corporation will be regarded as duty bound, morally and, in most cases, legally, to protect the privacy of people. Those who come of age around 2025 will be aghast at the lack of privacy protection in 2013. They will regard it somewhat as a current generation regards the social acceptance of smoking in the 1950s鈥攂izarre and disgusting.鈥
Nilofer Merchant, author of聽The New How: Creating Business Solutions Through Collaborative Strategy, wrote, 鈥淧rivacy will be reformed by 2025 by new 鈥榩rotocol鈥 leaders who advocate for new freedoms. Freedom in 2025 will be understood as being able to manage your data, your privacy.鈥
David Solomonoff, president of the New York Chapter of the Internet Society, wrote, 鈥淚nternet standards groups will integrate strong end-to-end encryption into everything. Social media and Cloud services will become much more decentralized. Business models will shift so that the consumer is in control, rather than the vendor, with vendor relationship management (VRM).鈥
Gary Kreps, director of the Center for Health and Risk Communication at George Mason University, wrote, 鈥淚 am optimistic that advances in health information technology and policy will continue to advance the security and utility of these systems for commercial and health promotion activities. I have already seen improvements in online systems that provide consumers with increased security and privacy choices for conducting their personal and professional activities. Consumer demand will help increase the sophistication of information system security in the future. As consumers become more accustomed to using information systems for a variety of commercial, entertainment, education, communication, and health promotion activities, they will become more comfortable with the security of these systems and less concerned about breaches of privacy.鈥
Jon Lebkowsky, Web developer at Consumer’s Union, responded, “I have to answer, 鈥榊es,鈥 to this question; the alternative is undesirable, if not unthinkable. Innovative developers have been researching, brainstorming, and experimenting toward the right set of technical solutions since the 1990s, but creating a viable technical infrastructure will not be enough. Business adoption, smart regulation, and some degree of cultural transformation, are all required to support online privacy and security as inherent assumptions of the online agora of the future. And, the concept and urgency of privacy may change, as well. The evolving culture of sharing diminishes the cultural value of absolute privacy. In the future, we may be less guarded about our lives and less protective of at least some elements of privacy. Two important questions include: how safe and secure can we presume to be as we become less private? And, what is the minimum desirable level of privacy?鈥
Ian O’Byrne, an assistant professor at the University of New Haven, wrote, 鈥淚 have little faith, or trust, in policy makers, governments, and businesses and their ability to secure freedom, liberty, and privacy in online spaces. I do believe in the power of the Internet, and think that programmers, coders, and those that are able to 鈥榳rite鈥 online will be able to create, protect, and secure these basic freedoms. I am beginning to think that social norms will continue to evolve and become just that鈥攕ocial norms. With cell phones, we initially thought it would be ridiculous to use the cell phone at dinner, out in public. Now, we are quickly getting to a point where people wear phones, cameras, and devices in public. We can use devices on flights and get online. Simply put, we are in the middle of two models. I think we will find a way. I trust human nature, for better or worse.鈥
Marina Gorbis, executive director at the Institute for the Future, a nonprofit research organization, responded, 鈥淧eople will realize the value of their personal data and increasingly use it as currency in various online and offline transactions. Creation of privacy around personal data will be driven not so much by policy and regulatory changes, but instead by advances and innovations in technologies for data protection and personal data management.鈥
Geoff Livingston, author, and president of Tenacity5 Media, wrote, 鈥淭echnology companies will be forced to develop opportunities to protect personal data. We can see from Snapchat’s success that people do not want every piece of information to be available for mining purposes. As the age of context progresses, the desire to remain private in some aspects of life will increase. Companies will be forced to offer this type of privacy, or they will lose customers and prospects. We will see a much more liberal view of privacy. Things we did not expect to become public will become public, and we will gladly share that information. For example, eating and exercise habits are now becoming increasingly public thanks to wearable technologies from Nike and Fitbit.鈥
Jesse Stay, founder of Stay N’ Alive Productions, wrote, 鈥淭echnology will take care of this. Leaders won’t have to. Peer-to-peer technologies and protocols, such as Bitcoin’s blockchain, allow for better ways of letting 鈥榰sers鈥 control their own privacy, taking control out of the hands of corporations and government. We are within five years of beginning to see this happen significantly. The public will have more control over their privacy through technology that empowers the consumer over the brand.鈥
Matthew Henry, a CIO in higher education commented, 鈥淚n a little over 10 years, basic standards that run our systems of networking and commerce from basic TCP to SMTP will need to be reestablished. Just about all the bases of what we use today were established for research and 鈥榝riendly鈥 or trusted relationships. As forward thinking as those who established these standards were, they did not see a future full of targeted abuse. Many branches of a future include pressure from policy makers to corporations. Pressure will come first from consumers and those of us who use technology on a day-to-day basis. Many compromises and innovative collaboration between corporations will need to happen. This will lead to an environment of balance of trust and release of privacy between consumer and corporations. Compromises will need to be made by all.鈥
Theme 2) The backlash against the most egregious privacy invasions will bring a new equilibrium between consumers, governments, and businesses鈥攁nd more-savvy citizens will get better at hiding things they do not want others to see.
David Vladeck, a law professor at Georgetown University, and former US Federal Trade Commission official, wrote, 鈥淭he public is only now beginning to fully understand the ecosystem that underlies the Internet. As the public becomes more aware of the massive, unconsented-to collection that is taking place, it will demand greater control over person information, including tracking and the information that is entered on websites for a specific purpose. The public will not countenance, in the long-term, unconsented uses of data provided for one purpose (i.e., order fulfillment) for another, wholly unrelated purpose… At some point, Congress, or the states, one by one, will have to enact laws that provide a solid yet adaptable legal framework for privacy protection.鈥
An anonymous respondent said, 鈥淭hey will have to [implement a privacy infrastructure]. There will be no other way to continue to use the Internet as widely as we do now if data cannot be protected. The loss of the Internet would bring on an economic collapse鈥攁nd cause widespread loss of community. You will not only expect privacy鈥攜ou will demand it.鈥
The CEO of a technology company replied, 鈥淭he free market will force policymakers and corporations to strike the right balance to protect and secure consumer data. The coming years we may see an increase in public figures being victimized by privacy violations and data leaks. In order to ensure customers continued use of digital media, both consumer rights advocates and citizens will demand increased consumer protections and businesses will lobby to protect their interests for the sake of innovation and monetization by 2025. Public norms will shift to sharing less personal content and see an increase in business and information and knowledge sharing. With companies like Snapchat, where consumers believe their communications are deleted, we may see an increase in companies that delete content shortly after it is shared as a norm in 2025 in order for the general public to share personal content and interests.鈥
Micha Benolie, CEO and co-founder of Open Garden, wrote, 鈥淢obile Internet will be predominant. Network infrastructures are not only built by carriers, but also by clusters of people and organizations growing their own Internet. Decentralization of the Internet will enable more privacy as well as easier and faster deployment of access to knowledge. Networks will become self-healing and self-organizing together, with organizations becoming less centralized and more horizontal.鈥
Bill St. Arnaud, a self-employed green Internet consultant, wrote, “Companies and individuals will build a far more secure, encrypted, end-to-end Internet鈥攊.e., a commercial TOR. There will also be much clearer requirements on opting in on any service that impinges on privacy. Companies like Google and Apple will be at the vanguard of these developments, as opposed to those companies like the telecommunications companies who have implicated in recent NSA scandals.鈥
Doug Casey, the director of IT for a large educational organization, commented, 鈥淚 sincerely believe this will be the case. Corporations are getting used to dealing with privacy and the consumerization of IT; this will be an issue that organizations and governments will need to address. I see, in the short term, a backlash of sorts in the next few years, in which individuals will become much more guarded with personal and financial information, leading to much greater control (or marketing of control鈥攔eal or perceived) of private information.鈥
Laurie Orlov, a futurist, consultant, and industry analyst, responded, 鈥淭he year 2025 is only a decade away, and even as outcry about privacy invasion gets louder, more technology is being introduced that is designed to help users easily share information (i.e., Instagram) or find each other (i.e., Tinder). People are gravitating towards the sign-in-and-share, Facebook-like style of online interactions. So, as innovators deliver the tools, and as users embrace them, policymakers will continue to be way behind in both understanding tech trends鈥攁nd/or part of the problem of using shared information (NSA, for example) in ways that are not anticipated. Public norms are headed towards greater acceptance of online sharing鈥攁nd business innovators are racing to capitalize on that acceptance. Individuals will continue to lack understanding about the implications of participation in online environments鈥攅ven as they gain understanding about one environment, technology change is always ahead of them. The longer a user agreement for use of data provided, the less likely these are to be read. See smart phone location-based apps for many examples.鈥
Steve Jones, a distinguished professor of communications at the University of Illinois-Chicago, replied, 鈥淚t is the 鈥榳hile also鈥 portion of the question that causes me to 鈥榞o negative鈥 with my answer, followed by the phrase 鈥榚asy-to-use.鈥 In the event that offering individuals choices for protecting their personal information can be monetized to a greater degree than using their personal information, then maybe that can happen. Otherwise, I do not think so. Frankly, I do not think they will be very different, though if nothing else, we will be still more accustomed to having less privacy (which implicitly means we will continue to have some).鈥
Dave Rusin, a digital serial entrepreneur, and former digital global corporate executive, wrote, 鈥淚t will be a mixture of policy makers (regulators) and the free market… I envision a fundamental change of 180 degrees, whereby a user will have to grant a multi-step permission鈥攁nd for marketers, your marketing will change to soliciting someone to opt-in by them granting you permission or apps separate and a part from the 鈥榯erms-of-service鈥 provided today, written in clever legalize allowing personal information to be utilized. Moreover, unless otherwise stated, by 2025, I see individual security access and privacy laws, up there as the equivalent of HIPPA [the health information privacy law], for all those that elect to drive any commerce, free or transactional, through peering centers located in the United States and other, more advanced economies. Peering centers will serve a gateway for certification and compliance for off-shore Internet access purveyors or governments.鈥
Christopher Castaneda, a technology developer/administrator, wrote, 鈥淸A]s more and more stories of government data monitoring are revealed, the public will more than likely begin to push back, demanding more surveillance restraint. The public will also be more critical of corporations鈥 use of public data, especially in social media and mobile technologies. In general terms, the public will be accepting of having its data used for various legal purposes, either in a desire for more convenience, better shopping deals, or outright ignorance of what personal data is available; however, the threshold of acceptance will only go so far. In recent years, public pushback against Facebook has shown some distaste for the company鈥檚 behavior. In addition, the use of mobile devices, and the data they will produce, will cause some public concern over their devices, as mobile devices are more personal than a desktop or laptop computer.鈥
Robert Tuohy, deputy director with an organization that studies and analyzes US Homeland Security, replied, 鈥淭he monetary rewards of acceptance will incentivize technologists and policymakers to find solutions that protect privacy to reasonable extent. The public will moderate its views on what it accepts with regards to privacy. It is already happening. The combination of better protections and more moderate expectations will make monetization more likely.鈥
Jim Harper, director of information policy studies at the Cato Institute, wrote, 鈥淭he challenges that exist now will still exist in 2025. Technology and social mores will still be in flux. By 2025, most people will have realized that they are in an information economy. Their behavior will be tailored to the existence of that economy, which means that they will hide some things more carefully, and they will share some things more willingly and with better, if still imperfect, awareness.鈥
Frank Feather, a business futurist, CEO, and trend tracker based in Ontario, Canada, wrote, 鈥淕overnments and other organizations have no option but to ensure security and confidentiality of personal information; however, governments have a responsibility to protect society, and thus must have the ability, according to strict guidelines, that allows them to search for and monitor criminal activity that is conducted via information systems of all kinds. I am confident that a proper balance will be struck and that court-enforced legislation will be passed.鈥
Micheal O’Foghlu, CTO of FeedHenry, based in Ireland, wrote, 鈥淭here are many developments happening. There are pressures from large players, who control much of the infrastructure. There are pressures from governments and civil rights/privacy advocates. A new compromise will be reached that shares more than before ICTs came to dominate, but it will not be as much as the privacy activists fear. In general, younger people have fewer concerns than older people. As they grow older, they will probably become more conservative but still seem more liberal than we are today. Thus, the norm will shift towards more acceptance of sharing of certain types of data, particularly if suitably anonymised.鈥
Aaron Balick, a psychotherapist and author of聽The Psychodynamics of Social Networking, responded, 鈥淭echnology develops in response to feedback from society by way of social shaping. Already, we have seen a great deal of responsive growth from a variety of online interfaces in response to the needs and desires of the populations they serve (and sometimes exploit). Social shaping is not a smooth process, and there are dominant structures that wield power more than others. That being said, I think the infrastructure with regard to security, liberty, and privacy online will continue to develop to concerns of different online cultures鈥攊ndividuals too will become savvier. The result will be far from perfect, but it will be responsive to changing social needs (which, themselves, are changing鈥攊.e., relationships to privacy). There is some evidence to show that the younger generation feels differently about privacy than does the generation that precedes it. That being said, younger people do appear to be making thoughtful choices about their privacy鈥攖hey may be doing differently from their parents, but it does not mean that they do not care. Public norms will shift with regard to greater tolerance and acceptance of information that may have been 鈥榦ver-shared,鈥 as there will be an entire generation who will be in the same boat on this one. New social networking platforms will continue to develop to enable different levels of privacy, and the general population will grow and learn to manage this better. Still, more information about our daily lives is uploaded into public or semi-public spaces than ever before (Google often does this on our behalf, whether we like it or not), so a certain degree of personal revelation will continue to be more available than it was in the past.鈥
Mattia Crespi, president of Qbit Technologies LLC, responded, 鈥淚 believe it is a must. It is out of question to think we can fail in getting to the right policies and find a balance by those years. Already now, the Internet of Things forces us to re-invent communications and policies, between protocols, devices, humans, and machines. By 2025, we should have reached a decent, balanced set of policies to support our interconnected lives. There will be a clear difference in the type and forms of data and privacy connected to it. For instance, I may not care if a very personal detail of mine is shared, as long it is done anonymously. I believe privacy in the future will be modular, flexible, and adaptable. There will be a strong link to time鈥攐n how long things can be kept private. Total recording will generate repositories of any action in our lives, and privacy will be more and more related to time in the sense of past actions, present actions, and future actions.鈥
PJ Rey, a PhD candidate in sociology at the University of Maryland, wrote, 鈥淔irst, we need to ask what incentive structures are in place for policy makers and business executives to pursue meaningful privacy protections. Without significant reform to the electoral process and updated regulatory infrastructure, it is hard to imagine that we will see much progress. Hopefully, we will get beyond hyperbolic declarations of the 鈥榙eath of privacy鈥 and understand that privacy and publicity are often mutually reinforcing. This would allow us to have more nuanced discussions about what responsibilities we have to one another and to what standards we should hold institutions.鈥
Gary Marchionini, professor and dean of the School of Information and Library Science at the University of North Carolina-Chapel Hill, replied, 鈥淚 am an optimist. I believe that people will become more aware of the conscious and unconscious (projected exo-information) traces of their existence as they work online聽andalso of the reflections of their existence added to cyberspace by other people and machines…The result will be a 2025 with strongly divergent views, beyond the political party divisions in the United States today; we could have open states (no privacy), as well as safe states (no disclosure).鈥
Theme 3) Living a public life is the new default. People will get used to this, adjust their norms, and accept more sharing and collection of data as a part of life鈥攅specially Millennials and the young people who follow them. Problems will persist and some will complain but most will not object or muster the energy to push back against this new reality in their lives.
A senior analyst for Internet economics and policy responded, 鈥淏usiness practices, and general social (as well as antisocial/criminal) behavior, has so thoroughly 鈥榓dapted鈥 to the reality of an insecure, privacy-rights-vacating, but nevertheless popularly tolerated Internet service delivery environment that, in the absence of some near-term, catastrophe-induced 鈥榖lank-slate鈥 overhaul of national and international laws, commercial law, and legal/regulatory enforcement mechanisms, as well as gross technical infrastructure, there is very little chance that a truly 鈥榮ecure, popularly accepted, and trusted privacy rights infrastructure鈥 will emerge by 2025. By 2025, increased public consciousness of the existential risks arising from near-universal availability of cheap technologies of (potential) mass destruction will probably have eroded expectations of privacy, to some degree. Whether such expectations will diminish faster or slower than the rate at which de jure and de facto privacy protections are lost will likely depend on the number and severity of catastrophic technology-related incidents that occur between now and then.鈥
Jim Warren, the retired editor and publisher of several microcomputer periodicals, a technology futurist columnist, open-government advocate/activist, and founder and chair of the first Conference on Computers, Freedom, & Privacy, wrote, “It seems clear that there are too many powerful organizations鈥攇overnmental, corporate, financial, etc.鈥攚ho聽want聽to track and profile聽every聽aspect of every person’s lives, activities, browsing interests, purchasing habits, investment efforts, personal associations, etc.鈥攆or them to聽ever鈥榓llow鈥 individuals anywhere nearly as much control over their own personal information, as many鈥攎ost?鈥攆olks would like to have. Additionally, there is great truth in the clich茅 that, 鈥楧esire for privacy is a mile wide鈥nd an inch deep.鈥 People want聽their聽privacy, but they also want to know all sorts of things about聽otherpeople. In this case, 鈥榩eople鈥 can be as per five Supreme Court 鈥楯ustices,’ and the most recent Republican Presidential candidate’s twisted view鈥攖hat, 鈥楥orporations are people.鈥欌
Jari Arkko, Internet expert for Ericsson, and chair of the Internet Engineering Task Force, wrote, 鈥淭here are no absolutely private or secure solutions, nor is there absolute lack of privacy. And, there are great challenges in this area. At the same time, I am optimistic that we can and will improve the state of Internet privacy. It is clear that the society’s norms are trending towards accepting more public disclosure of information related to people.鈥
Dan Gordon, of Valhalla Partners, wrote, 鈥淓very other business infrastructure in the history of capitalism (and probably before) has started out as a 鈥榃ild West鈥 operation and has developed rules, frameworks, norms, balances of power, and (some) refuge or relief for the powerless. It is incomprehensible to me to think that this will not happen with the online business infrastructure. We are moving in the direction of demanding and tolerating less privacy and more shameless 鈥榣iving in the limelight.鈥 Since most of us are hungering to become celebrities with no privacy (in exchange for what鈥攏otoriety?), it is hard to see that we will value it more over time than we do today.鈥
Herb Lin, chief scientist for the Computer Science and Telecommunications Board at the National Research Council of the US National Academies of Science, wrote, 鈥淭he public is strongly conflicted about privacy. In the abstract, people want privacy, but in fact, they want privacy for themselves鈥攂ut less so for other people. And, they are willing to trade off privacy for economic advantages鈥攐ften very small advantages鈥攑artly because they do not realize the extent of their privacy tradeoffs and partly because they do not care enough about their privacy relative to those advantages. Moreover, they want security鈥攁nd to the extent that privacy and security must be traded off, they will opt for the latter. As time goes on without a major security incident, concerns about security fade, and privacy becomes more important. But, when another security incident happens, concerns about privacy fade. The public will still be conflicted about privacy in 2025.鈥
Robert Cannon, Internet law and policy expert, wrote, 鈥淒igital natives, as they have matured, have become savvier with their sense of privacy. They have become more astute about what they put online, and how… The norm has become kids becoming more aware that they have an online face that is visible. They may cloak their presence when they want to be less visible; they may groom their presence so that, when they are search for, there is something good to find. The fear-based message that if you tweet something bad it will be discovered persists; the real message is that we all have online presences and it is up to youth to craft what is found when it is searched for.鈥
A technologist working in Internet policy predicted, 鈥淭he sad fact is that a backdoor, or 鈥榣awful access mechanism,鈥 cannot be used exclusively by 鈥榞ood guys鈥 (those working in the interests of a given user) but in fact, can be equally used by 鈥榖ad guys鈥 (those working against the interests of a given user). The engineers have already begun to harden the core Internet infrastructure, and Internet corporations are learning that they have to offer end-to-end security or they need to confine the 鈥榤onetization鈥 of content to the ends of the communication, preferably to the client, where access has to be covert (read as: important enough to break into someone’s house) or through due process. This is a fact that will lead society to prefer non-hobbled ICT infrastructure for communications. I think we will all have a better understanding of what privacy is and the value it gives us in an 眉ber-connected society by 2025. I think kids will learn about this stuff from a very early age and will continue to lead society in privacy sensitivity.鈥
David Berkowitz, the chief marketing officer for a large advertising agency responded, 鈥淎 number of models like this have been tested, and during the next 10 years or so, it is likely that one will catch on with enough support by business, corporate, and consumer interests. Relatively few individuals will actually take part in such a program though. We are already reaching a turning point of wanting to be public and private at the same time. People care more about privacy but share more publicly. Expect these extremes to continue to diverge, with far more robust privacy options and protection in 2025 than what we are used to today, but also far more shared publicly. By 2025, we will also have national and prominent local elected officials, who entered college in the early part of last decade, when social media usage started to become widespread. So, there will be a greater acceptance of people having shared things that they since regret. Granted, some of those regrets will come back to haunt such candidates and officials.鈥
Bob Frankston, an Internet pioneer and technology innovator, whose work helped allow people to have control of the networking of the Internet within their homes, wrote, “This is a complex problem with no simple solution. The concept of privacy keeps evolving, and I hope that tolerance will improve in the face of more information being public.鈥
Justin Reich, a fellow at Harvard University’s Berkman Center for Internet & Society, said, 鈥淭he risks of privacy violations are too abstract and distal, the benefits of surrendering privacy too immediate and valued. A very small number of organizations will continue to battle on behalf of the public for stronger privacy protections, probably having some success against the most extreme transgressions, but businesses will lobby against protections under the banner of consumer choice, and harms against consumers will remain too difficult to communicate. This might be different if we have a Hoover-esque government transgression. Broadly, people do not care about Internet privacy. And, as youth who grow up in a culture of exchanging data for service get older, the public will, on average, care even less about their privacy and data security by 2025. If the Snowden revelations do not shift public opinion, what will?鈥
Bob Briscoe, chief researcher in networking and infrastructure for British Telecom, wrote, “Society’s memory is short鈥擲talinism, Maoism, Nazism, and McCarthyism happened too long ago to worry about. The technology will be created, but policy-makers will not make it compulsory under pressure from corporate interests. It will not be used widely because commercial organisations have strong interests to gather information about their potential customers. Although many people are uneasy about erosion of their privacy, only a few feel strongly enough to withdraw their business from companies who put customer privacy below their desires to gather market information. Therefore the business risk of not introducing a new privacy-rights infrastructure is low for all commercial organisations. Younger people are already less concerned about their privacy than older people. I would like to think that repeated high-profile abuses of people’s private information would cause a backlash, however the trend will continue towards less concern about personal privacy.鈥
Amy Hartman, an information science professional based in Ohio wrote, 鈥淚t will evolve to continue to make money and be secure for various corporate and academic entities, as well as those individuals who understand how to manipulate code enough to protect themselves. Because of the open nature of the Web, there will always be some level of corruption, fraud, and/or spying, the same way there is in our larger society and other forums. We cannot erase basic human nature, and if there is money to be made, or power to be had by sneaking around and manipulating people and information, someone is going to find a way to do it. Most people, even now, do not really understand most of the larger privacy issues when it comes to the privacy, use, and misuse of personal information. So long as it does not impact most people’s daily lives in a way they can see, I suspect norms will remain the same.鈥
Jeremy Epstein, a senior computer scientist at SRI International, responded, 鈥淐onsumers do not care enough about their privacy to create the incentives necessary to protect privacy rights. As a result, I doubt that there will be a method for offering individual choices for protecting personal information. Consumers will continue to complain about privacy, but they will not be willing to do anything about it. We will still give up our information for a ten-cent discount on a cup of coffee or shorter lines at the tollbooth. It will be similar to the (mythical) boiling frog鈥攚e will continue to lose privacy one degree at a time, until there is none left at all.鈥
Chen Jiangong, an Internet business analyst in China, responded, 鈥淚 think it will be. But there will be new questions. The privacy war between businesses and consumers will go on forever because the new technology will challenge the consumers鈥 privacy again and again. The public opinion of privacy will change; people will give up a part of secondary privacy鈥攋ust as, in ancient China, women once viewed their feet as a private thing, to be kept out of public view, but now they do not. Maybe in the future, people will not view something that we think of as private today as private.鈥
Supten Sarbadhikari, a leader working to implement the National Health Portal of India, wrote, 鈥淎ctually, the answer is not an unqualified 鈥榊es.鈥 Shades of grey are bound to be present. While it is most likely that secure systems will be in place, and online transactions will become ubiquitous, it is also likely that potential breaches and threats to security will increase. Privacy is a relative concept. When the President of the United States gets admitted for any surgical procedure, other than the attending doctors, no one has access to the details. Whereas, when the Prime Minister of India gets admitted for a surgical procedure, a medical bulletin is broadcast every hour in the public domain. With the world becoming a smaller global village, these socio-cultural contexts may also be blurred partly.鈥
Peter Janca, managed services development lead at MCNC, the nonprofit regional network operator serving North Carolina, responded, 鈥淎s more business transactions take place via the Internet, someone (i.e., policymakers, IETF, financial industry, or the like) will need to establish a popularly-accepted, secure method of completing such transactions. As relates to consumer tracking and analytics, I believe work will have been done by 2025 to address public perceptions on the beneficial nature of such activities. We already see the 鈥榶ounger鈥 generation holding a norm about privacy, which is way more open than that of the over-30 generation. This norm is more open. As this generation matures, I predict it will retain much of this openness, yielding a more open public norm about privacy. This prediction could be modified, should several (more than two or three) serious, negative, public events take place that damage the younger generation’s confidence in being open (i.e., reduced level of concern about privacy).鈥
Daniel Castro, director of the Center for Data Innovation, wrote, “Privacy is a value that shifts over time based on culture and context. Old privacy fears will subside, and new ones will emerge as technology evolves. Consumers will accept or reject technologies based on their relative levels of privacy and the norms of the time. There is anonymity in a crowd, and as more people participate in different online forums, an individual’s relative privacy will increase.鈥
Cliff Zukin, a professor at Rutgers University, wrote, 鈥淥ne could argue that this is what we now have. Largely, it is secure. It is popularly accepted, and it can be broken by governments and other actors. It should be the same in 2025. The mass public will accept it as safe鈥攂ut really, no information is completely 鈥榮afe,鈥 now or then. There is a generational story here, with two full generations now living life mixing online and with direct experiences merging to a single reality. So, they will be less questioning of big data. This has always been a fact of life for them.鈥
A survey research professional who has worked for decades for government, academic, and commercial organizations responded, 鈥淚n assuming they have no privacy, people will permanently alter their credit and consumption behavior in futile attempts to ‘throw off the scent’ on consumer-tracking uses of their PII. Exceptions will be made for public emergency needs鈥攑andemic flus, radiation accidents, missing persons, etc. Identity crimes will encourage the Social Security Administration to reissue social security numbers, people to permanently change their names, etc. Driver鈥檚 licenses will have embedded tracking chips. Some people will stop driving. And, maybe, we will have some other weird stuff we cannot imagine now鈥攍ike drone-proof venetian blinds. Well, maybe not that last thing.鈥
Above-and-Beyond Responses: Part 2
A range of input by some respondents covered additional aspects of the issues.
鈥楾he emotional climate around privacy and security will only increase鈥
Mike Liebhold, senior researcher and distinguished fellow at the Institute for the Future, wrote, 鈥淭here will be many political, technological, and service efforts to improve privacy but, likely, even greater efforts by dotcoms to mine personal data, by black hat intruders to steal whatever they can, and by government鈥檚 pervasive surveillance of the entire Internet. There will undoubtedly be some very lurid tragedies as a result of mining, stealing, or surveillance, so the emotional climate around privacy and security will only increase.鈥
鈥業t is absurd to believe this is solvable at the technical infrastructure level鈥
Seth Finkelstein, a programmer, consultant, and EFF Pioneer of the Electronic Frontier Award winner, responded, 鈥淭his is a classic case of bargaining power imbalance and asymmetric information. There is such an enormous disparity between individuals supposedly making these 鈥榗hoices鈥 for their information, and the businesses profiting from the monetization, that it is absurd to believe this is solvable at the technical infrastructure level. Every such proposal I have ever seen has struck me as 鈥榚nding up鈥 replicating what happened with 鈥榣icense agreements鈥欌攖hat is, creating a take-it-or-leave-it system, where a person is essentially powerless to do anything but completely accept the corporation’s terms, which are constrained only by consumer-protection law (which has been very much weakened over the years)…鈥
2025 debates about privacy will be more sophisticated than they are today
Jamais Cascio, a writer and futurist specializing in possible futures scenario outcomes, wrote, 鈥淚 have little doubt that policy makers and technology innovators will have attempted to create a 鈥榮ecure, etc.鈥 information infrastructure by 2025, but I do not believe that it will yet be simultaneously secure, accepted, and trusted. We will likely see myriad smaller efforts, attempts to provide secure and acceptable service within a narrower framework (i.e., for a particular hardware vendor, within a particular community), but incompatibilities will continue to confound users, and multiple interested parties (including, but not limited to, governments and advertisers) will continue to push for exceptions and special access. I also suspect that, by 2025, we will have experienced at least one massive breach-of-trust incident, where a supposedly secure and trusted system will be broken open in an especially damaging way (i.e., Google’s Gmail archives are cracked open and released). This may not set back the technical efforts, but it will severely undermine any hope for public trust in these systems. The common understanding about privacy is that it is an issue of 鈥榲isibility鈥欌攃an I, or my information, be seen by others? While that is superficially true, it is not the entirety of the issue. Privacy is about 鈥榗ontrol鈥欌攃an I decide who gets to see my information, or is that decided for me, without my knowledge or consent? I suspect that, by 2025, the debates about privacy will be more sophisticated than they are today and will focus on this control aspect (versus the crude fear-mongering about teenagers taking selfies, etc.).鈥
鈥楥apacities of the surveillance state will always exceed protections of the people鈥
Jason Pontin, editor-in-chief and publisher of MIT Technology Review, responded, 鈥淭he end you describe is highly utopian and combines a large number of goods, each of which would be wickedly hard to achieve. To give one example, a really 鈥榮ecure鈥 Internet does not exist and could not be built on the current infrastructure; we would need another Internet. On the other hand, I do anticipate significant progress on some of these goods. For instance, I think there will be renewed demands for more privacy controls from consumers and citizens, and I believe that companies and policymakers will have to satisfy those demands. On the other hand, I expect the capacities of the surveillance state to always exceed the protections of ordinary people. Perhaps, people will come to think of their private information as an asset, which they will selectively release to organizations and companies in exchange for certain conveniences or services.鈥
Business models are about tracking; we have not yet seen the backlash
Joe Touch, director of the Information Sciences Institute’s Postel Center at the University of Southern California, replied, 鈥淧rivacy is in direct opposition to the business models of the largest Internet companies. The Internet does not require a login, birthdate, or username, yet these companies continue to create 鈥榳alled gardens鈥 that do鈥攖o create the information that fuels their revenue stream… The issue is not about policymakers and corporations, but rather, whether the public will continue to be comfortable exposing that information. Such norms already vary widely, and I continue to be surprised at the extent to which posts within the frame of a personal video screen, and thus to the entire world, exceed what would be posted鈥攂y the same person鈥攖o their own front door. I think we have not yet seen the backlash of the current norms of personal public exposure; we might when that generation shifts from being ‘kids just posting stuff’ to being in the position of establishing and protecting their company’s reputation as managers.鈥
An 鈥榓rms race鈥 between surveillance and personal protection that goes on and on
Brian Behlendorf, Internet pioneer and board member of several nonprofits and for-profits, wrote, 鈥淭his struggle for the boundary of personal digital space鈥攖he digital equivalent of the boundary of my own home, in both legal and technical senses, but also the boundary of my own body and brain鈥攊.e., the Fifth Amendment鈥攚ill be an ongoing debate, unresolved and only more vigorous in 2025. We will likely give up the notion of public physical location as personal data, due to both official location tracking by governments (i.e., toll road payments, police car license plate scanning) and private-sector tools that track phone IDs, faces, and other personally-identifiable bits of data when people walk by or into retail shops or other interesting points. But, in the other direction, we will have even stronger rules and societal expectations against surveillance (government and private) upon the activities within people’s homes or other enclosed spaces. There will be no tolerance for drone peeping toms, sniffing the wireless emissions from tablets, displays, and more. There will continually be new technologies for surveillance鈥攅ach of which will spawn demand for counter-technologies. This arms race will become more a part of our national conversation about human rights, the concept of the confidential vote, and the rights of private individuals and companies to not be compelled to become agents of the surveillance state. I feel like I am compelled to answer, 鈥榊es,鈥 because the question posits the existence of something we have today and will always have鈥攂ut it does not ask any qualifying questions, such as the quality of those choices, the cost of different levels of privacy, what 鈥榚asy to use鈥 means, etc. It also assumes that policy makers and technology innovators would work together on this, when, in reality, they may take diametrically opposed actions, as they often do today.鈥
鈥楾here will be no privacy to speak of. We will have given it all away鈥
Rex Miller, a thought leader, and principal at a consultancy, responded, 鈥淭he idea of nation-states will undergo major redefinition. The idea is now obsolete. They have been transcended by global commerce and global platforms like Google, Facebook, etc. These will provide secured enclaves as a value-added service. Policymakers move too slow in the current structure and cannot coordinate between different governance structures to be effective. There will be no privacy to speak of. We will have given away all of it, and there will rise groups who protect the different interests of vulnerable groups.鈥
Many social and economic cues will depend on disclosure of private information
Jerry Michalski, founder of REX, the Relationship Economy eXpedition, wrote, 鈥淒ata is easily copied anywhere. The idea that some entity is going to relent and not store our data, and that we will have confidence that our data is not replicated for nefarious use somewhere, is naive. I do not think governments and businesses, motivated as they are today to collect as much personal data as they possibly can, store it, and analyze it, will come to a reasonable understanding that works for citizens. At best, there may be a citizen revolt that sets whole new guidelines, but I am not optimistic that it will happen. By 2025, you will be considered a non-person if you do not have embarrassing photos or videos online from your misspent youth. People who were very parsimonious about sharing personal information will be less credible, and will be trusted less, because others will not be able to see any of their indiscretions鈥攖he things that make them human and more trustworthy.鈥
鈥楨very person鈥檚 actions tracked and monetized continuously and pervasively鈥
Fred Baker, Internet pioneer, longtime leader in the IETF, and Cisco Systems Fellow, responded, 鈥淭he Chinese startup Face++ is creating a technology from which it would be easy to imagine the year 2025, seeing a world similar to what is described in the movie聽Minority Report, in which every person’s actions are tracked and monetized continuously and pervasively. I am hesitant to make predictions there, beyond that, if we cannot counter it, we must expect it to become reality. Per its website, 鈥楩ace++ uses the cutting-edge technology of computer vision and data mining to provide three core vision services (Detection, Recognition, and Analysis).鈥 If we must assume continuous and pervasive service-based and crowd-sourced surveillance, and monetization of its results, we must also assume that the information gleaned will be available to anyone that can pay to obtain it. That essentially creates a 鈥榮mall town鈥 dynamic on a global scale鈥攑eople become more careful about what they reveal, and everybody knows the dirty secrets anyway.鈥
鈥業nvasion of privacy will be normed by public acceptance鈥
Alison Alexander, a professor at the Grady College of Journalism and Mass Communication at the University of Georgia, wrote, 鈥淧rivacy infrastructure will be ever evolving and never finished. Hardware and software changes will present new issues on a regular basis. Governments鈥 need for data will continue to raise questions for the First and Fourth Amendment. Corporations will try new ideas with intended and unintended consequences. Currently, social views on privacy vary dramatically, ranging from, 鈥楴othing to hide,鈥 to, 鈥楤e careful: it lasts forever,鈥 to the 鈥楻ight to be forgotten.鈥 … Invasion of privacy will be normed by public acceptance of what was previously considered improper. Privacy will continue to be threatened by new ways to learn more about everyone.鈥
The 鈥榦ther鈥 1% will emerge and want to live off the grid 鈥 and that will bring scrutiny
William Schrader, the co-founder and CEO of PSINet Inc., the first commercial ISP, observed, 鈥淎 small percentage of the world’s population, perhaps a tiny fraction of 1% of mankind, will attempt to go off-grid or in some way disengage from big data. To accomplish this, they must own nothing that is tracked by government, such as real estate or autos, have no utilities in their name, have no bank account, and not earn a living by receiving a check or direct deposit. In short, they would only use cash, not own a phone, not have a tax identification number, etc. It is a challenging existence by today’s normal standards, and it is not one that is easy to maintain without sincere discipline. I expect that these off-grid people will be treated by authorities worldwide as suspect in some way, simply because they choose not to be tracked. That alone, being off-grid, will likely be made a serious crime… The original concept of privacy is dead. The new concept of privacy is: 鈥極nly the government and my friends know.鈥”
The change in norms will even affect dinner parties and dates
Alexander B. Howard, an expert on digital issues and government, wrote, 鈥淎 much higher percentage of the public will understand that any action taken in view of another human with a connected smartphone or made upon a social media platform online could end up on YouTube or the evening news nearly instantly and potentially irrevocably. The ability of politicians and other public figures to keep the public’s business private will be substantially hindered, although wealthy and powerful people will continue to have the ability to pay to keep their private lives somewhat obfuscated. Social norms will evolve to a point where participants in dates and dinner parties will need to explicitly ask for agreement that conversations or other interactions be kept unrecorded.鈥
鈥楾ransparency鈥 will replace 鈥榩rivacy鈥 as the social norm and ideal
Marc Prensky, director of the Global Future Education Foundation and Institute, wrote, 鈥淭his genie is now out of the bottle: Protection of 鈥榩rivate鈥 information will become almost (or, perhaps, completely) impossible because those who want it will always be ahead of those trying to protect it. So, as the last pre-Internet generation cedes control to the new global Internet generations, attitudes toward security, privacy, and intellectual property will be very different than the way we have thought of them in the past. In many, or most, areas, transparency will replace secrecy as the norm. These changes will not happen, though, at Internet speeds but more gradually as the last pre-Internet generation slowly dies off. In the future, there will be聽no聽privacy of information as we as we now know it and have known it in the past鈥攁ny data put online will become transparently available to all, despite any and all efforts to prevent this. 鈥楾ransparency鈥 will replace 鈥榩rivacy鈥 as the social norm and ideal.鈥
鈥楾echnical innovation is outpacing regulators鈥 ability to act and react鈥
Glenn Edens, a director of research in networking, security, and distributed systems within the Computer Science Laboratory at PARC, a Xerox Company, wrote, 鈥淎 major overhaul of the architecture of the Internet is required to meet the goals of privacy and the rampant use of personal information by commercial interests. It is not clear that these issues can be resolved by 2025 at our current pace. Technical innovation is outpacing regulators鈥 ability to act and react. It is not clear what direction public norms about privacy will emerge. There is evidence of change, as well as a lack of interest or education about the issues. Scott McNealy once said that 鈥榩rivacy is dead鈥欌攊n some respects he might have been right.鈥
A 鈥榯hird option鈥 might emerge in independent data warehouses
Bryan Padgett, research systems manager for a major US entertainment company, wrote, 鈥淭he current two-sided security-versus-privacy pendulum will be replaced by a third option鈥攑erhaps independent warehouses of data controlled by independent parties, fed by data providers, and accessed by government only when necessary. With increasing amounts of data being generated for and by all users worldwide, it will continue to be used for good and bad in increasing amounts鈥 I can see a future where it is accepted that anonymity has fallen by the wayside as the online world and the real world become even more fused; however, along with the loss of anonymity, the ability to remove and prevent others from seeing and/or using your data (or data about you) will emerge to become clearer and easier to manage from a single entity. If that comes to pass, it would only come from a government or international agreement, with academia and the private sector creating the technical solution that allows it to work.鈥
Media literacy will be the key as technological evolution keeps changing the rules
Pamela Rutledge, PhD, and director of the Media Psychology Research Center, responded, 鈥淭he privacy horse is out of the barn, in spite of the people arguing whether or not the barn door should be open or closed. A more critical issue is overcoming our anxiety over ‘the way things were’ and evaluating what needs to be protected for individuals, institutions, and governments. Policymakers do not have the expertise, or the incentive structure, to create adaptive regulations in an evolving environment. Technology innovators have the burden of financial accountability and will continue to balance the expansion of technology capabilities and features with the majority of consumer demands. Public perception is understandably narrow; most see privacy as being about Facebook settings or identity theft. We have unleashed a powerful tool on society without bothering to teach people how to use it. Media literacy will increasingly become the key to creating the demand for a reasonable balance of privacy and information control with commercial interests and personal experience. Our perceptions about privacy change as technology creates more things that define us and more ways to share. With technology increasingly reflecting our identity, privacy becomes equated with liberty, heightening our sensitivity to having choice. Social norms about privacy will change because increased technology adoption reduces technophobia, and technology use increases individual agency across all sectors of society. Individuals will increasingly demand to decide for themselves where, and when, the benefits of sharing outweigh the costs.鈥
鈥業 am not even sure if we really have a problem鈥
Nicholas Bowman, a professor at West Virginia University, commented, 鈥淚 do not believe this will ever be a 鈥榮olved鈥 problem, given that there is a diametric opposition between 鈥榤onetization鈥 and 鈥榩ersonal informative.鈥 A wise scholar, Steve Jones (of the University of Illinois at Chicago), once said that 鈥榠f you don’t pay for content, you are the content,鈥 and there is an enduring truth to this… At least, in 2013, the only monetary value of the Internet seems to be for nano-casted advertising, which is only possible when users tell us who they are… Unless we find a different economic model to base our information infrastructure on, there will be no solution. Frankly, I am not even sure if we really have a problem. By definition, norms are always subject to the influence of time鈥攊n the 1900s, it was inappropriate for one to show their ankles in public at a beach, yet, by the 1940s, the revealing two-piece bikini was sold to the public as a way to conserve water-proof fabrics for the war effort; in just 40 years, one’s skin went from being a private affair to an expositionist one.鈥
Two Internets 鈥 or more 鈥 might evolve
D.K. Sachdev, a consultant and adjunct professor in satellite systems, wrote, 鈥淭he objectives, as stated in the question, are, technically, achievable; however, it conflicts with the business plans of major social networks that, in fact, encourage users to act against their own privacy! I believe that there is scope for two separate networks: one totally secure and the other driven by social media. In a way, that is what Blackberry created, and government users all over the world relied on it. Unfortunately, it is shrinking because of the conflicting objectives of the market place.鈥
Thorlaug Agustsdottir, public relations manager for the Icelandic Pirate Party, replied, 鈥淭here will be an alternative Web or alternative software that will offer people protection from snooping companies, while the ability to mask IP will probably still be a somewhat ‘advanced knowledge,’ while true anonymity will be, as it is today, just a myth (at least down to the IP level, if not to some kind of a central ‘official’ personal identification level). In 2025, people will be ever more concerned with online privacy.鈥
Generational change will shift norms 鈥 a president鈥檚 鈥榙runk selfies鈥 won鈥檛 matter
Erin Stark, a respondent who shared no additional identifying details, said, 鈥淲e have been sharing so much, with so little concern, for so long; personal information is no longer owned by the individual, but by the Google鈥檚, Amazon鈥檚, and Facebook鈥檚 of the world… We have grown up online… Today’s concern with privacy will be non-existent by 2025; our presidents will have drunk selfies made public, and our Supreme Court justices will have tweeted and blogged their hopes and fears. This is going to result in total openness.鈥
鈥楾he sting of revealing too much will lessen鈥
Pamela Wright, chief innovation officer for the US National Archives, wrote, 鈥淎 new way of looking at privacy may be established. The Internet will know you鈥攜our family, your doctor, your bank, where you got coffee this morning, everything substantive and seemingly trivial about your life and what you do鈥攁nd that will erase your privacy, but will also protect you. This is a frightening concept, but it is already well down the road. Norms are already changing due, in part, to the ubiquity of social media use. What my generation considered strictly private is completely shareable for the next generation… I was recently taken aback when I saw a colleague had sent out a picture on social media less than two hours after she gave birth. By 2025, this will be considered a very private way to handle the news, as everything about the birth will be available online as it is happening鈥攆rom pictures to all kinds of health data. We may be more forgiving of people as we see everyone’s personal foibles everywhere… In the future, I expect that no one will be able to control one鈥檚 image online enough to be spotless, and the sting of revealing too much will lessen.鈥
A 鈥榩eace architecture鈥 is best for an 鈥榓lways-on鈥 world
Chris Uwaje, president of the Institute of Software Practitioners of Nigeria, wrote, 鈥淭he stabilizing element of the future of the new, ‘always-on’ (AO) world will be overwhelmingly determined by a 鈥榩eace architecture’ that has stubbornly eluded humanity. Therefore, today, policy makers and technology innovators may not have the ability to create a secured, popularly accepted, and trusted privacy-rights infrastructure by 2025 without first of all understanding that a global peace architecture is fundamental to the stability and survivability of the future world. Today, we assume that ‘peace’ is an integral part of human behavior, which, by extension, negates the philosophy of security, liberty, and privacy. Therefore, the AO world must deal with a ‘peace engineering infrastructure’ as the survivability tool of the future.鈥
This is a tipping-point moment鈥攖eetering on the brink of effective 鈥榤ind control鈥
Mikey O’Connor, one of two elected representatives to ICANN’s GNSO Council, wrote, 鈥淭he public will cheerfully trade massive invasion of their personal privacy in exchange for goods and services they would otherwise have to pay for. In so doing, they will also increasingly compromise the privacy of those they interact with, albeit inadvertently. If the current privacy-awareness surge is turned back by the well-organized coalition of private and governmental surveillance lobbyists, it seems quite possible that this will be the tipping point, beyond which there is no return. Thus, by 2025, this battle will be lost鈥攁nd much of our humanity with it. On the other hand, let us think positively. Global climate change may have reached that tipping point, as well鈥攊n which case, we can be spectators in a race to see which exterminates us first鈥攈umans or Mother Nature. We are at a tipping point. We are teetering on the capability of truly effective mind control. Once we have actually arrived there, the concern about privacy will simply be scrubbed off the agenda, and privacy will become ever less of a concern as the older, less plugged-in generation dies off.鈥
鈥楶rivacy will be perceived as a part of exchange鈥
Polina Kolozaridi, a faculty member at the Center for New Media and Society, based in Russia, responded, 鈥淭he idea of what privacy is can change noticeably in 2025. Partly, privacy will be perceived as a part of exchange. It will be more difficult to have self-image without public profile, at least when it is opened to some institutions (starting with educational and healthcare systems). Partly, there will appear new sorts of private information (like thoughts, if neuro-tech will be fast enough). The problem of 鈥榳hom I can trust here鈥 will probably remain… It will be like Pacific Ocean of transparency and some big islands (or even continents) of abilities to hide one’s personal data. It will not be easy to use such abilities… Having some profiles with information we consider private will be like owning an ID or a passport. It will be OK to trust some corporation or state to own it, but not OK to share it in some public profiles; social networking, like Facebook or Instagram, will not disclose more than now. But, there will appear chill-out, or media-out, zones when and where one may be out of all digitalization.鈥
A distributed system of user rights will replace the current hierarchical system
One extended answer came from聽Doc Searls, director of ProjectVRM at Harvard University’s Berkman Center for Internet & Society. He outlined how citizen-centered privacy protection can be created:
鈥淭here will be a privacy rights infrastructure in place long before 2025. I believe it will materialize within the next three to five years. It will not be a top-down system, however 鈥 meaning that it will not come from big companies, or from policy makers in the United States, the European Union, or other familiar targets of today鈥檚 privacy activism. Instead, it will come from new technological approaches that enable individuals and organizations to operate in full privacy without fear of surveillance. These approaches will be distributed, rather than centralized.
The spread of these approaches will follow the rules of heterarchy more than those of hierarchy. Adriana Lukas defines heterarchy as 鈥榓 network of elements in which each element shares the same聽horizontalposition of power and authority, each playing a theoretically equal role.鈥 In fact, this is not new, nor unfamiliar. It is embodied in the Internet鈥檚 founding protocols, as well as why the Internet grew so rapidly, wildly, and outside the control of companies and government.
Key to our emerging privacy-creating system will be the ability of individuals to assert their own terms, policies, and preferences in dealings with others, including companies and governments鈥攁nd for equal consenting parties to work out norms that do not require intervention or control by large companies or governments. The principles and practices here are also not new. They are at the heart of freedom of contract, which was abandoned by large mass-marketing and mass-manufacturing companies in the Industrial Age, when scale required 鈥榗ontracts of adhesion,鈥 such as those we 鈥榓ccept鈥 without reading. Adhesive contracts brought ease to Industrial Age hierarchical systems but are obsolete in the Internet age, when everybody brings their own unique assets to the market鈥檚 vast table, as well as growing power over what can be done with those assets.
Freedom of contract is also central to a free and open society, as well as to the architecture of the Internet鈥檚 founding protocols. It is also anathema to the defaulted approaches of the phone and cable companies, by whose graces we enjoy access to the Internet. Fortunately, the Internet鈥檚 system is deeper than theirs and, therefore, will prevail. Oceans outlive boats鈥攅ven the biggest ones.
The end state will be one in which individuals will enjoy far more control of their personal data, and privacy in general, than they do today, and that will be good for business.
We now live in two worlds:
One is the physical world that has been around since the Big Bang, and where we have operated civilization for the last few thousand years. The norms around privacy are highly developed, and very deep, in this world. The technologies providing privacy鈥攃lothing, doors, windows, curtains, shades, shutters, and so on鈥攁re familiar and easy for everybody to understand and to use. In this world, most of us also understand and respect private spaces, even when we can see and hear into them. This is why we at least try to ignore sounds made by people sitting at the next table at a restaurant or in line at a theater. Without these small courtesies, civilization would be much less civilized.
The other is the virtual world. This world is composed of binary math鈥攐nes and zeroes鈥攁nd is structured around the Internet, which puts every end at a functional distance of zero from every other end, at a cost that veers toward zero as well. This world coexists with the physical one and is very new. We can date it from the appearance of the graphical browser, the ISP, and universal email, which came together in 1995. This world is going on nineteen years old, and no norms within it approach the maturity of those in the physical world. Behavioral norms in the virtual world are provisional, immature, and far from civilized. A store on Main Street, for example, would never plant a tracking beacon in a customer鈥檚 pants to report back on what the customer does after they leave the store; yet, this rude behavior is normative today on the commercial Web. By 2025, however, this kind of rudeness will be as gone in the virtual world as living naked in caves is gone in the physical world, simply because we will have invented the digital equivalents of clothing, doors, windows, sealed envelopes, and simple human courtesies.鈥
New identification standards will emerge
Another extensive analysis of how a system could be created鈥攁nd what the obstacles might be鈥攃ame from聽Francis Heylighen, a Belgian cyberneticist investigating the evolution of intelligent organization. He wrote:
鈥淎 key enabling technology for the future Internet will be a universal, secure standard for unambiguously establishing a person鈥檚 identity. Several, albeit uncoordinated, steps have already been made in order to create such a standard, including Web-enabled electronic identification cards in several European countries, the OpenID standard, and ORCID, an attempt to ensure that publications are attributed to the right author.
The reasons why standardization is slow to emerge tend to be social, economic, and political, rather than technological, as different corporations, governments and organizations are not inclined to exchange the valuable information they hold. An additional obstacle is people鈥檚 legitimate fear for invasion of privacy and abuse,
However, without universal regulation, abuse of private information by hackers, corporations, or governments is more, rather than less, likely, as no one knows who has access to which personal information, and as hardly any laws exist that specify what organizations can and cannot do with the information they possess.
Technologically, it is perfectly possible (albeit non-trivial) to develop secure schemes that anonymize data so that only the ones that really need information about an individual can get access to the specific data they require, and to nothing else. For example, a doctor who finds you collapsed in the street should be able to consult your medical record and to send a message to your next of kin, but should not have access to your financial record. Your bank, on the other hand, should know the transactions made from your account, but not your state of health.
Next to the technological challenge, the larger challenge will be to institute a system of rules and laws that specify exactly who can use which information about a person. This system should be perfectly transparent to the individual so that you can find out exactly what happens with your data and have the right to withhold information that is not crucial to the functioning of an organization.
The general principle is that you should be able to act anonymously for any non-crucial transaction, but that the distributed intelligence system should be able to maximally extract the collective (anonymous or non-anonymous) information that will help it to make better decisions, while also being able to securely and transparently address a specific individual with personalized recommendations.
Such a regulatory standard for data protection is, at this moment, being developed by the European Union. Once such a computational and legal technology is in place, interactions across the Internet are likely to become much safer and more efficient. People are less likely to worry about the free use of public, anonymized data, such as which kinds of people are most likely to get diabetes or to buy motorcycles, but who are less willing to tolerate that commercial or government organizations would claim property or control over their personal data.鈥
About this Canvassing of Experts
The expert predictions reported here about the impact of the Internet over the next 10 years came in response to one of eight questions asked by the Pew Research Center Internet Project and 黑料不打烊鈥檚 Imagining the Internet Center in an online canvassing conducted between November 25, 2013, and January 13, 2014. This is the sixth Internet study the two organizations have conducted together since 2004. For this project, we invited more than 12,000 experts and members of the interested public to share their opinions on the likely future of the Internet and 2,551 responded to at least one of the questions we asked. Some 2,511 responded to this question about the future of privacy.
The Web-based instrument was fielded to three audiences. The first was a list of targeted experts identified and accumulated by Pew Research and 黑料不打烊 during the five previous rounds of this study, as well as those identified across 12 years of studying the Internet realm during its formative years. The second wave of solicitation was targeted to prominent listservs of Internet analysts, including lists titled: Association of Internet Researchers, Internet Rights and Principles, Liberation Technology, American Political Science Association, Cybertelecom, and the Communication and Information Technologies section of the American Sociological Association. The third audience was the mailing list of the Pew Research Center Internet Project, which includes those who closely follow technology trends, data, and themselves are often builders of parts of the online world. While most people who responded live in North America, people from across the world were invited to participate.
Since the data are based on a non-random sample, the results are not projectable to any population other than the individuals expressing their points of view in this sample. The respondents鈥 remarks reflect their personal positions and are not the positions of their employers; the descriptions of their leadership roles help identify their background and the locus of their expertise. About 84% of respondents identified themselves as being based in North America; the others hail from all corners of the world. When asked about their 鈥減rimary area of Internet interest,鈥 19% identified themselves as research scientists; 9% said they were entrepreneurs or business leaders; 10% as authors, editors or journalists; 8% as technology developers or administrators; 8% as advocates or activist users; 7% said they were futurists or consultants; 2% as legislators, politicians or lawyers; 2% as pioneers or originators; and 33% specified their primary area of interest as 鈥渙ther.鈥
On this particular question many of the respondents elected to remain anonymous. Because people鈥檚 level of expertise is an important element of their participation in the conversation, anonymous respondents were given the opportunity to share a description of their Internet expertise or background.
Here are some of the key respondents in this report:
Miguel Alcaine, International Telecommunication Union area representative for Central America;聽Jari Arkko, chair of the Internet Engineering Task Force;聽Francois-Dominique Armingaud, formerly a computer engineer for IBM now teaching security;聽danah boyd, research scientist at Microsoft;聽Stowe Boyd, lead at GigaOM Research;聽David Brin, author of聽The Transparent Society;聽Bob Briscoe, chief researcher for British Telecom;聽Vint Cerf, vice president and chief Internet evangelist at Google;聽David Clark, senior scientist at MIT鈥檚 Computer Science and Artificial Intelligence Laboratory;聽Glenn Edens, research scientist at PARC and IETF area chair;聽Jeremy Epstein, lead director for the US National Science Foundation鈥檚 Secure and Trustworthy Cyberspace program;聽Seth Finkelstein, a programmer, consultant and EFF Pioneer of the Electronic Frontier Award winner;聽Bob Frankston, Internet pioneer and innovator;聽Dan Gordon聽of Valhalla Partners;聽Jonathan Grudin, principal researcher for Microsoft;聽Joel Halpern聽a distinguished engineer at Ericsson;聽Jim Hendler, Semantic Web scientist and professor at Rensselaer Polytechnic Institute;聽Francis Heylighen, a Belgian cyberneticist investigating the evolution of intelligent organizations;聽Christian Huitema, distinguished engineer with Microsoft;聽Jeff Jarvis, director of the Tow-Knight Center at the City University of New York;聽Mike Leibhold, senior researcher at the Institute for the Future;聽Herb Lin, chief scientist for the Computer Science and Telecommunications Board at the US National Academies of Science;聽Clifford Lynch, executive director of the Coalition for Networked Information;聽Alice Marwick, author of聽Celebrity, Publicity, and Branding in the Social Media Age;聽Peter McCann, a senior staff engineer in the telecommunications industry;聽Jerry Michalski, founder of REX, the Relationship Economy eXpedition;聽Craig Newmark, founder of Craig鈥檚 List;聽Ian Peter, pioneer Internet activist and Internet rights advocate;聽Raymond Plzak, former CEO of the American Registry for Internet Numbers, now a member of the board of ICANN;聽Jason Pontin, editor in chief and publisher of MIT Technology Review;聽Howard Rheingold, pioneering Internet sociologist;聽Mike Roberts, Internet Hall of Famer and longtime leader with ICANN;聽Mark Rotenberg, president of the Electronic Privacy Information Center;聽Paul Saffo, managing director of Discern Analytics and consulting associate professor at Stanford;聽Henning Schulzrinne, Internet Hall of Fame member;聽Tiffany Shlain, founder of the Webby Awards and host of聽The Future Starts Here;聽Barbara Simons, former president of ACM and board chair for Verified Voting;聽Doc Searls, director of ProjectVRM at Harvard鈥檚 Berkman Center; and聽Hal Varian, chief economist for Google.
Here is a selection of other institutions at which respondents work or have affiliations:聽Yahoo; Intel; IBM; Hewlett-Packard; Nokia; Amazon; Netflix; Verizon; PayPal; BBN; Comcast; US Congress; EFF; W3C; The Web Foundation; NASA; Association of Internet Researchers; Bloomberg News; World Future Society; ACM; the Aspen Institute; GigaOm; the Markle Foundation; the Network Information Center; key offices of US and European Union governments; the Internet Engineering Task Force; the Internet Hall of Fame; ARIN; Nominet; Oxford Internet Institute; Princeton, Yale, Brown, Georgetown, Carnegie-Mellon, Duke, Purdue, Florida State and Columbia universities; the universities of Pennsylvania, California-Berkeley, Southern California, North Carolina-Chapel Hill, Kentucky, Maryland, Kansas, Texas-Austin, Illinois-Urbana-Champaign, the Georgia Institute of Technology, and Boston College.
