CDR: Software to Track E-Mail Raises Privacy Concerns

A. Melon juicy at melontraffickers.com
Wed Nov 22 23:03:06 PST 2000


NYT Article

By AMY HARMON
 It was during a recent job search that Donald Bell gave in to the temptation to bug his own e-mail. Mr. Bell, 55, had e-mailed dozens of rŽsumŽs to prospective employers and received scant response. Naturally he wondered: was he being rejected, or had his messages gone unread?

Anyone who has been left hanging knows it is the sort of nagging question that is rarely answered. But thanks to a furtive application of a feature common to the latest e-mail programs, Mr. Bell was able to learn, undetected, that the intended recipients were indeed opening his messages. With a service he found on the Internet, he could even tell precisely when a recipient read his e-mail messages and if the message was sent on to anyone else.

"It feels a little naughty, because you can't do this with postal mail," said Mr. Bell, who has since started his own company in San Francisco and sometimes uses the e-mail service to check whether colleagues forward messages that he considers confidential. "But e-mail is a different animal. You have to just reach into your heart and decide what you're going to do."

Mr. Bell is not alone in taking advantage of new e-mail software that makes certain kinds of monitoring easy and nearly imperceptible. At a time when many Internet users have come to grips with advertisers' tracking their anonymous trail of clicks across the World Wide Web, the frontier of the electronic privacy wars is shifting to the more personal realm of the e-mail "in" box. 

Marketing companies now regularly keep tabs on which prospective customers open their e-mail solicitations, and at what time of day, arguing that consumers benefit because the information is used to devise more personalized promotions. Individuals who have used e-mail tracking services say they feel entitled to monitor their own correspondence in a medium where it is so easily passed along or ignored.

But privacy advocates contend that such practices open a new window of surveillance on a traditionally private sphere of communications. They compare it to having someone who leaves a message on your answering machine Ñ a telemarketer, say, or your mother Ñ alerted the moment you listen to it. More troubling, they say, is that the same technology can be used to match a recipient's e-mail address with previously anonymous records of the Web sites visited from that person's computer. 

Connecting the data collected through files known as cookies with an e-mail address, the privacy advocates argue, will be irresistible to marketers seeking to identify the buying habits and personal tastes of individual consumers. The linked databases, they say, could also be consulted by law enforcement agencies, insurance companies, employers and others who would need only an e-mail address to look up a record of an individual's activities on the Web.

"You can buy 50,000 addresses of people who subscribe to The New Yorker," said Richard M. Smith, chief technology officer of the Privacy Foundation. "But you don't know what articles they're reading in it, or what books they've bought or what medical problems they've been researching lately. That's very much a possibility within this technology."

The technology in question is seemingly innocuous: the ability of the latest e-mail programs to send and display images. E-mail senders use the feature, based on the Web's computer language, to create colorful messages known as HTML mail.

But many also use it to embed tiny images that are invisible to the recipients. Marketers call them pixel tags and say they are used to gauge the success of e-mail campaigns. Privacy advocates prefer a more ominous name Ñ Web bugs.

The instant someone opens an e-mail message that contains instructions to display a graphic file, his or her computer automatically fetches the image from a specified location on the Internet. By adding a unique identifying code to those instructions, a sender can record when a particular recipient retrieves the image, and, thus, when the e-mail message is opened.

Subsequent retrieval of the image can tell the sender how often the message is reopened, and sometimes whether it has been forwarded (though not the precise forwarding address). 

Direct marketers, the most frequent users of the technique, say it is akin to the standard practice among Internet advertisers of tracking which banners Web surfers click on.

"I don't see any privacy issues there because the data is secure and never sold," said William Park, chief executive of Digital Impact, an e- mail marketing company that has designed campaigns for dozens of clients. "From the marketing perspective, if you're not opening that e- mail it might be we're sending it on the wrong day of the week, or the subject line is really boring, or the subject line is really cryptic."

The emergence of HTML mail may well make reading e-mail messages more like visiting a Web site, with all the attendant privacy risks. But for many Internet users, such risks may seem more acceptable on the Web than they do in their "in" box.

Sophisticated Internet users know that when they click on a Web advertisement they are probably exposing themselves to scrutiny, and that it is possible to reject the files that record such behavior.

But few are aware of the tracking capability of HTML mail. And while some e-mail programs, like Microsoft Outlook and Eudora, give users the option of screening images out, others, like America Online 6.0 and Web-based Hotmail do not.

Some recipients of e-mail newsletters say they do not mind if the sender knows when they open a message, particularly if the aim is to alert them to a sale or a new product. But others argue that it violates their right to communicate, or not, without being observed. And particularly in a country where postal mailboxes are protected by federal law, the notion that reading e-mail messages is no longer a private act may prove disconcerting.

"We would shudder if regular letters were implanted with secret signals that alerted their senders when they were opened," said Jeffrey Rosen, author of "The Unwanted Gaze: The Destruction of Privacy in America" (Random House, 2000). "It seems to invade both the privacy of the home and in some sense the privacy of the mind." 

Still, the practice is becoming more common. About 60 percent of e- mail users have software that can read HTML mail, according to the online research firm Jupiter Media Metrix, a number expected to grow significantly as America Online users install version 6.0, the first update to include the feature, released last month.

As advertising on Web sites proves increasingly ineffective, many companies like Eddie Bauer and Borders are relying more heavily on e-mail solicitations whose value lies in part in the ability to track recipient response. How many subscribers actually open e-mail has also become an important measurement by which e-mail newsletter companies like Lifeminders sell advertising. Companies that send unsolicited bulk e-mail use tracking to increase the value of their address lists by weeding out those who never open their messages.

And individuals can use Postel Services, the Korean company whose service Mr. Bell used to learn the fate of his job applications. Messages routed through its servers have tiny graphic files appended before being sent on. When the recipient opens the message, Postel is alerted and in turn alerts the sender. 

Soobok Lee, the company's founder, said about 30,000 people had used the service since its introduction in May, in addition to several companies that had purchased licenses to track all of their correspondence. The first 30 messages a month are free, after which Postel charges 2 cents a message. 

But whatever the utility or etiquette involved in monitoring the opening of a single e-mail message, it is the potential for that act to open a door to far more personal information that some find most unsettling.

The main object of concern is advertising companies like DoubleClick, Engage and 24/7 Media that already track the Web travels of tens of millions of Internet users, anonymously, by way of cookies.

The first time someone visits a site where DoubleClick places advertisements, for instance, the company deposits an identifying code Ñ No. 1234, say Ñ on the visitor's computer. After that, every time the computer with cookie No. 1234 visits one of the several thousand sites that contract with DoubleClick, the company records the visit. 

DoubleClick and others use the information gleaned from cookies to choose which advertisement from the hundreds of clients they represent is most suited to an individual's tastes. They may know, for instance, that No. 1234 has recently visited sites related to quitting smoking, sport utility vehicles and the Green Party Ñ but they have generally had no way of knowing who No. 1234 is.

The opportunity to identify the person behind the cookie comes when one of the advertising firms sends HTML mail to a consumer on behalf of a client, tagged with a unique identifier to track when it is opened. When the recipient opens such a message, the cookie code is exposed to the sender's server computer, which can compare it with those stored in its own database. At that moment, No. 1234 could be revealed as joe at computer.com.

After drawing scrutiny this year from the Federal Trade Commission, the major advertisers have vowed to refrain from linking personally identifiable information to anonymously collected data without permission from the consumer. But privacy advocates say consumers may consent unwittingly, and they note that voluntary privacy policies are easily modified. 

Another practice, which involves using e-mail as a kind of Trojan horse to deliver a cookie file, recently prompted the Michigan attorney general's office to warn that it would sue one Web site, Evite, under the state's Consumer Protection Act unless it began to inform consumers.

Party organizers use Evite, a San Francisco-based online invitation service, to send e-mail HTML invitations. In addition to collecting the official R.S.V.P.'s, Evite is able to tell the organizer who opened the mail without responding, and who did not open it. Those who open the invitation receive a cookie from Evite, which would not otherwise be possible unless they visited its Web site.

Privacy advocates speculate that the company could "rent"the cookie and the e-mail address it is associated with to other sites.

Evite's chief executive, Josh Silverman, declined to be interviewed, citing continuing negotiations with the Michigan attorney general. He said in a statement that the cookies Evite delivered were not linked to addresses. 

But Nick Ragouzis, a technically savvy business consultant in San Francisco who discovered Evite's invisible pixel in an invitation he received recently, said that alone was enough to make him feel his privacy had been invaded.

"I don't really care that they know I opened this particular message," Mr. Ragouzis said. "But they never asked me. And there would be other messages that I would care about. I feel I should be asked."

Mr. Ragouzis said he told the host of the party, Jad Duwaik, to refrain from sending him future Evite invitations and asked that he stop using the company's services altogether. But Mr. Duwaik, who organizes networking events for entrepreneurs, said the information provided by Evite about how many of the invitees open the messge helped him gauge interest in his parties. 

"It's something I feel uncomfortable with as a consumer," Mr. Duwaik said. "But as an organizer it's just too useful to give up."






More information about the cypherpunks-legacy mailing list