Internet ad agencies rationalise profiling by explaining that it lets them personalise the browsing experience. They claim that by knowing your preferences, they can serve up banner ads which are more likely to appeal to you than randomly selected ones. Maybe so, but most Internet analysts see a more logical explanation: click-through rates on banner ads are shockingly low, so the best way for ad agencies to make money fast is to mine their data and deliver targeted lists of prospective buyers to their clients.
Of course, cookies aren't the only way to siphon data from your computer to a far-off server. With the explosion in popularity of always-on Internet connections, it's amazingly easy for software developers to write Internet connection code into their releases. That's the time-honoured principle behind Trojan horse programs like Back Orifice. If a company can convince you to install the program in the first place, it has free rein to snoop through your data and transmit at will.
So what happens when the Trojan horse comes in the form of trusted software? Just last year, three popular programs were discovered to be making surreptitious Net transmissions. Real Networks' RealJukebox transmitted statistics about music files to the mothership. Comet Cursors, a browser add-in that transforms an ordinary mouse pointer into a custom image at partner sites, sent serial numbers (stored in a cookie, naturally) back to a central server to track its product's usage. And a silly holiday-themed computer game called Elf Bowling wasn't infected with a virus -- as persistent Web rumours insisted -- but it did open an Internet connection capable of transmitting data.
In all three cases, the impact on consumers was minimal. The real damage to the companies was measured in PR terms, as each one had to apologise to its users and somehow convince skeptical observers that its failure to disclose the hidden communications channel was an innocent oversight. However, sooner or later -- probably sooner -- an unscrupulous developer will use this capability to really steal data. Don't let it be yours.
Take me to the Surveillance 2 ZDNet News special.