Password Prompt
|

Marriott Hack Shows The Risk of Our Surveillance Society

Mashable asked the question that many of you may have had when you learned one of the more recently reported details of the Marriott/Starwood hack. “Why do hotels collect and store passports?

The answer they came up with turned out to be something that some of us started talking about a few years ago, but it might surprise some of you:

Moussouris explained that hotels collect identity information so they can run background checks, as well as to serve as a reference for the government should anything criminal happen. That law enforcement element means that hotels may need to store, not just check, identification.

“It’s the fact that it might need to be checked against a criminal database, and different countries vary in their regulations about that,” Moussouris said.

The European Union requires hotels in member states to collect passport information. However, what they do with that information varies. For example, in Italy, hotels automatically give this to the authorities. But that’s not the case throughout Europe. Policy on ID collection varies between cities and states in the US.

In the rash of post 9/11 rule changes, not to mention the Las Vegas mass shooting, there have been calls for both private companies and public entities to gather up information about anyone and everyone who passes through their area. Passport information, motor vehicle license plate data, driver’s license information, credit card receipts, internet browsing, etc. have all become part and parcel of what is being tracked, collected and stored in the name of law enforcement. We can argue about the legality of that, or even the effectiveness of that, but the one thing that was never in question was the need for that information to be kept secure and not misused.

In this case, we now have the possibility that people have had their passport information, and therefore their travel movements tracked, by foreign intelligence services. That’s not good at all. But this is hardly the only situation where this kind of thing is likely happening. This is just the one that impacted millions of people worldwide and made headlines. How many other instances are there of someone either hacking, or misusing their access to this kind of information to stalk, harass, or illegally track innocent civilians? All made possible by the laws meant to keep us safer, because once you start collecting and keeping that much data, you create a target. A very inviting, almost intoxicating target.

All that personal information is just sitting there, waiting for someone to search it. Why would we expect that would only ever happen when officially sanctioned?

Human nature tells us otherwise.

Similar Posts

  • Also Not Quite Dead Yet; Xmarks!

    At least it seems to have survived thanks to a new buyer. Details are non-existent right now, as with the Bloglines news, but it will be interesting to see what the new owners have in store for Xmarks users. Personally, I’ve rather been enjoying Firefox Sync, so I’m going to hold off on switching back…

  • |

    Linked: 5 Ransomware Predictions for 2022

    It makes sense, for the reasons Jim points out. Your ability to collect ransom payments is diminished if the organization has backups they can simply rebuild with. So, if you can find a way to lock not just the live data, but also the backups, you stand to make more money.

    What I wonder is if this will cause organizations to look at that old-school offline backup option? Keep a copy of your data physically away from your network, locked in a drawer or closet, etc.

    But, is that even feasible any longer?

  • Contact sub-folders

    Let’s make a rule. If you use a mobile device that doesn’t support sub-folders in the address book, don’t bother having sub-folders in your Outlook contacts, ok? Of course in our office it’s not completely the user’s fault. Some years ago, when upgrading to Office 2000 I think, our IT staff created a backup of…

  • Round up

    Links to interesting things: DDNS Service to block faulty Linksys routers. Yahoo! IM contains security flaw. Keeping it fun -Kevin makes a good point! Lockergnome releases shareware feedreader Follow these topics: Uncategorized

  • New CT Summation DII-eDII Guide

    For those of you using Summation, especially service bureaus, but also law firms doing in house Summation work: This document provides information about the CT Summation DII/eDII file to service bureaus. The Table of Contents serves as an outline of the electronic discovery (eDiscovery) workflow from the perspective of a service bureau. This document also…

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

To respond on your own website, enter the URL of your response which should contain a link to this post's permalink URL. Your response will then appear (possibly after moderation) on this page. Want to update or remove your response? Update or delete your post and re-enter your post's URL again. (Find out more about Webmentions.)