{"id":3806,"date":"2010-09-28T22:39:03","date_gmt":"2010-09-28T21:39:03","guid":{"rendered":"https:\/\/brennigjones.com\/blog\/?p=3806"},"modified":"2015-02-25T20:37:46","modified_gmt":"2015-02-25T20:37:46","slug":"the-flow-of-information-and-collateral-damage","status":"publish","type":"post","link":"https:\/\/brennigjones.com\/blog\/?p=3806","title":{"rendered":"The flow of information and collateral damage"},"content":{"rendered":"<p>The internet is just one big fat conduit for pictures and words. Sometimes the pictures move, sometimes they don&#8217;t. Sometimes the words make sense, sometimes I&#8217;m not too sure. And sometimes the words aren&#8217;t supposed to be out there.<\/p>\n<p>The activities of law-firm ACS:Law have been very widely aired in the media, as has the alleged &#8216;loss of a list of people&#8217; who, it is reported, the law-firm either is or has taken action against.<\/p>\n<p>And you read that story and you think of &#8216;a list&#8217;. And you might even think &#8216;good, that kind of information needs to be exposed&#8217;.<\/p>\n<p>But what if &#8216;the list&#8217; isn&#8217;t a list?<\/p>\n<p>What if the information is actually a total database of every piece of information on ACS:Law&#8217;s email-server?<\/p>\n<p>What if that information was broken down in to mailboxes for each email account, and sub-broken down in to Inbox, SentItems, Drafts and Deleted?<\/p>\n<p>What if the contents of that database &#8211; being the contents of everything on ACS:Law&#8217;s email-server &#8211; go far beyond being &#8216;a list&#8217;?<\/p>\n<p>What if these emails included personal communications that included private information such as, for example, hospital appointment information?<\/p>\n<p>Is there, in the civilian world &#8211; as there is in the military one &#8211; a phrase like &#8216;acceptable collateral damage&#8217;, an acceptable amount of disclosure of <em>private<\/em> information, which could be made available in the pursuit of exposing the methods and activities of ACS:Law?<\/p>\n<p>How would you feel, if that were your personal information that was put on the internet, just because you emailed your husband or wife who happened to work for ACS:Law?<\/p>\n<p>And finally, how would you feel if you were a mildly interested observer of the whole ACS: Law situation being unfolded, if that database of emails just fetched up in your email inbox?<\/p>\n<p>Well, substitute the words &#8216;dropbox&#8217; for &#8217;email inbox&#8217; and that&#8217;s the place where I was, earlier today.<\/p>\n<p>I didn&#8217;t actually rub my hands with glee, once I&#8217;d understood the compressed file had ACS:Law written all over it, but I did have a frisson of excitement.<\/p>\n<p>And then, as I began peeling back the layers of data, as the true nature of the information in the database was revealed, I started to feel sick.<\/p>\n<p>I went outside, walked around the house, hissed at a passing cat, came back in, had a cup of tea and a slice of cake and&#8230;<\/p>\n<p>Deleted the file.<\/p>\n<p>I think the bounty-hunting activities of ACS:Law are reprehensible. The methods this so-called regulated law firm have employed have been scandalous.<\/p>\n<p>ACS:Law&#8217;s financially-motivated ambulance-chasing has damaged lives and harmed reputations. The fact this firm is deemed, by the Law Society, to be operating within acceptable bounds is a clear indicator that the Law Society has fewer moral values than a Public Guardian should have.<\/p>\n<p>I would love ACS:Law to look at my (substantial!) download traffic statistics and come for me; I could hang them out to dry.<\/p>\n<p>But I wouldn&#8217;t use a database of emails that included personal information to bury them.<\/p>\n<p>I&#8217;d use facts and common sense and then I&#8217;d use my media connections to expose ACS:Law and their activities for everyone to see.<\/p>\n<p>But I wouldn&#8217;t use the blunt tool that appeared in my dropbox.<\/p>\n<p>It appears I have higher moral values than either ACS:Law or the Law Society.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The internet is just one big fat conduit for pictures and words. Sometimes the pictures move, sometimes they don&#8217;t. Sometimes the words make sense, sometimes<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3806","post","type-post","status-publish","format-standard","hentry","category-stuff","two-columns"],"_links":{"self":[{"href":"https:\/\/brennigjones.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/3806","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/brennigjones.com\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/brennigjones.com\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/brennigjones.com\/blog\/index.php?rest_route=\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/brennigjones.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3806"}],"version-history":[{"count":0,"href":"https:\/\/brennigjones.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/3806\/revisions"}],"wp:attachment":[{"href":"https:\/\/brennigjones.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3806"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/brennigjones.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3806"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/brennigjones.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3806"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}