Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and Management

Big Brother vs. Little Brother: Mapping Where Our Personal Information Goes

By Erik Kleinsmith
bigbrother-enews
May 8, 2018

Less than a year before his death in 1950, Eric Blair, under the pen name George Orwell, published “Nineteen Eighty-Four,” a dystopian novel about government tyranny by intrusion, surveillance and manipulation of thought. For Baby Boomers and my fellow Generation Xers, Orwell’s book was often required reading in high school as a warning against the loss of privacy and control in our personal lives.

More than 30 years after the title’s year, we’re coming to the realization that it’s not Big Brother that we need to be concerned about as much as the thousands of Little Brothers. The Little Brother effect is largely carried out by non-governmental entities and citizens that are able to collect, process, store, analyze, steal, corrupt, fake and sell information related to almost every aspect of our lives.

More and more, the news is filled with stories about how personal information is being used to benefit others. From revelations after Mark Zuckerberg’s pseudo mea culpa in front of Congress last month, to stories about fake news, identity theft, and how data mining is being used by political campaigns to understand the demographics and psychographics of potential voters, these Little Brothers are collecting massive amounts of personal data – all with our tacit consent.

While it is critical for intelligence analysts, investigators, researchers, and anyone else who relies on publicly available information to evaluate sources of information, it is also critical for the average citizen to look at the where, how, and why their personal information is being collected and used. Mapping out where Big Brothers and Little Brothers are accessing information provides insight into the underlying factors driving today’s privacy concerns.

As the map above shows, personal information can be used by many different entities and for many different purposes. The majority of information people share about themselves is required in exchange for access to goods and services.

Sharing personal information with the top half of the map (government entities, educational organizations and financial institutions) is generally deemed acceptable as long as there is confidence that information is protected. Federal laws such as HIPAA for medical privacy, FERPA for educational privacy, and regulations such as Executive Order 12333 for intelligence oversight, are all federally codified protections that ensure trust.

However, these protections are far from perfect. In my own experience working in a military program called Able Danger, I saw firsthand how oversight rules protecting U.S. persons were followed to such a strict degree that we failed to identify and possibly thwart the men who would become the 9/11 hijackers. Nevertheless, for the most part, federal protections provide confidence and security.

Be Leery About Little Brother

While concerns about Big Brothers’ ability to monitor our communications and activities will never go away, greater privacy concerns should center on Little Brothers, as highlighted in the lower half of the chart. There must be public skepticism about how Facebook, Google, Amazon, Cambridge Analytica and similar companies handle personal information. It is now readily apparent that these companies have the ability to track what we say and do, sell our information to third parties, target us for specific advertising, and change what we see and read. For example, they have the discretion to determine if information is “unsafe to the community,” as in the recent case involving Facebook bloggers Diamond and Silk.

For many of these businesses, personal information has become their currency and a few have been so successful in using this currency that they’ve become veritable monopolies. To better protect private information, there has been recent talk of enhancing regulations on Facebook and other giant tech companies. However, this can be a double-edged sword if proposed changes also prohibit market-based competition. While it is possible for competition and regulations to effect some sort of change, any true solution will only be inflicted if something affects the source of their currency, such as change in the demands of individual users and consumers. 

While it’s next to impossible to know the true risks of sharing personal information, people must have a better understanding of where their information goes, who has access to it, and how it’s being used. More so than ever before, people must understand that everything they enter online and every button they click, Big Brother and, perhaps more frighteningly, Little Brother will always be watching.

KEYWORDS: data breach data privacy information security security investigations Situational Awareness

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Erik Kleinsmith is the Associate Vice President for Business Development in Intelligence, National & Homeland Security, and Cyber for American Military University. He is a former Army Intelligence Officer and the former portfolio manager for Intelligence & Security Training at Lockheed Martin. Erik is one of the subjects of a book entitled The Watchers by Shane Harris, which covered his work on a program called Able Danger tracking Al-Qaeda prior to 9/11. He currently resides in Virginia with his wife of 26 years. He can be reached at IPSauthor@apus.edu.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Chicago's "Big Brother" Cameras Get Praise from DHS Secretary

    See More
  • Top New York Cop Dismisses Big Brother Concerns Over Cameras

    See More
  • Big Brother Chicago to Add More Cameras

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • Security of Information and Communication Networks

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing