Blurred Boundaries: Understanding Generational Identification Based on Personal Experience

July 5, 2023

The concept of generational classification has long been used to understand and analyze societal trends, cultural shifts, and the shared experiences of different age groups. However, the traditional approach of categorizing individuals into specific generations based solely on their year of birth has its limitations. Personal experiences, technological advancements, and individual perspectives play a significant role in shaping one’s generational identification. This article explores the idea of generational identification based on personal experience and how it can blur the boundaries between generations.

The Traditional Approach to Generational Classification

The traditional method of categorizing generations relies on fixed date ranges based on birth years. This approach provides a broad understanding of the collective experiences and characteristics of each generation. However, it fails to account for the diversity of experiences and the impact of personal memories and historical events that can shape individual identification.

Generational Identification Through Personal Experience

Generational identification based solely on birth year can often overlook the nuances of personal experiences and cultural influences that shape an individual’s perspective. For example, take a child born in 1964, classified as a baby boomer by traditional generational boundaries. However, this individual’s formative years and upbringing were primarily influenced by the mid to late 70’s and early 80’s. Their experiences, values, and cultural touchpoints align more closely with those who came of age during that era rather than those born in 1946, despite being labeled as part of the same baby boomer generation. This highlights the limitations of generational labels when it comes to capturing the diverse range of experiences and influences that shape an individual’s worldview.

Technological Advancements and Shifting Perspectives

Technological advancements have been instrumental in shaping generational identification. Individuals who grew up in an era marked by the widespread use of smartphones and social media platforms, such as those born in the late 1990s and early 2000s, often find their experiences closely tied to the millennial and Gen Z generations. Their familiarity with smartphones, constant connectivity, and the rise of social media has profoundly influenced their worldview and communication styles. Despite being classified within a specific generational cohort based on their birth year, their immersion in digital technologies sets them apart from earlier generations and strengthens their identification with the digital age. This example illustrates how personal experiences and technological developments can bridge generational gaps and contribute to a more nuanced understanding of generational identity.

Work-Life Balance and Values

Generational identification can be influenced by shared values and societal shifts, such as the importance placed on work-life balance. For example, Generation X is known for valuing work-life balance and rejecting traditional corporate structures. However, it’s important to note that the desire for work-life balance is not limited to Generation X. Younger generations, like Millennials and Gen Z, also prioritize work-life balance and meaningful integration of their personal and professional lives. As a result, individuals who share these values may identify with Generation X, irrespective of their birth year.

Overlapping Generational Traits

It is essential to recognize that individuals can exhibit traits and characteristics from multiple generations, leading to a blending of generational influences. This blending occurs as a result of diverse experiences and the evolving nature of society.

As societal and technological changes continue to shape our world, the idea of multigenerational identification has emerged. This concept acknowledges that individuals may resonate with different generational traits, creating hybrid generational identities. For example, terms like “Millennium X” or “Xennial” have been coined to describe those who straddle the line between Generation X and the Millennial generation.

Embracing Personal Generational Identification

Expanding on the idea of embracing personal generational identification, it is important to encourage individuals to reflect on their own experiences and select the years or age that truly resonate with their formative moments. Rather than solely relying on birth year or external categorizations, this approach empowers individuals to define their generational identity based on the personal memories and influences that shaped them.

One way to approach this is by considering the first significant memory that had a lasting impact on one’s life. This could be a historical event, a cultural phenomenon, a technological breakthrough, or any other moment that stands out as a defining experience. By pinpointing this memory and identifying the year or age at which it occurred, individuals can anchor their generational identification to a specific period that holds personal significance.

For example, someone born in 1965 may traditionally be classified as a Baby Boomer. However, if their most significant memory is the rise of the personal computer in the late 1970s, they may feel a stronger connection to the values and cultural shifts associated with Generation X. By embracing this personal generational identification, individuals can gain a deeper understanding of their own values, beliefs, and cultural influences.

This approach acknowledges that generational identification is a complex and multifaceted concept that goes beyond arbitrary date ranges. It recognizes that individuals are shaped by their unique experiences and that those experiences can span multiple generations. By embracing personal generational identification, individuals can take ownership of their generational narrative and engage in meaningful discussions that transcend traditional generational boundaries.

Furthermore, this perspective fosters a more inclusive and nuanced understanding of generational dynamics. It recognizes that generational differences are not solely based on birth years but also on individual experiences and influences. By embracing personal generational identification, individuals can contribute to a broader conversation about generational diversity and the complexity of cultural shifts over time.


IT—The Business Partner You Didn’t Know You Had

February 9, 2022

The work that’s going on in your IT department is fundamentally shaping the success of your company. It has emerged as one of the most important sectors in today’s economy and you can get ahead of the competition by learning how to connect with your IT department. 

Your IT department handles everything from making sure your internal networks stay up and running, ensuring that your websites and applications function smoothly. This has them working deep within your company’s back-end operations as well as in customer-facing positions. Your IT department is building a unique insight into your business that you can leverage.

Here’s how you can realize the potential in your IT department. 

The Truth Behind Your IT Department

The IT department is no longer just another department seen as the cost of doing business expense. Your IT department has actually become one of the most important profit drivers for your business.

IT departments have gone from fixing printers and tinkering with internal phone lines to making sure your customers and clients have the exact experience they’re looking for. IT has move from the sidelines to front and center when it comes to operations, efficiency, and profit.

Gone are the days when it took a room full of book keepers transcribing every transaction into a ledger and then manually calculating the company accounts; or having to attract customers be personal contact or placing your product in a store.

Computerization has fundamentally changed how companies not only manage the company but also how they access customers.

Where IT Sits in Today’s Business World 

Do you know that your IT department has the biggest impact on how customers perceive your company? When your customers first check out your business, they’re getting their first impression from your websites, your apps, and other digital technologies that your IT department is responsible for cultivating. Some may argue that the marketing department is responsible for these digital technologies, but it is the IT department that translates the marketing departments specification and brings those website and apps into existence.

As key aspects of our Industries have moved into the digital realm, IT departments have likewise seen their responsibilities and their importance shift. Being able to connect with your IT department is an absolute necessity that separates today’s most successful companies from those who feel like they’re stuck in a pre-digital past. 

This leaves us with one big question. How do you communicate with your IT department? 

How to Communicate with Your IT Department 

IT departments have a reputation for being tech “nerds” stuck in their silos, but this perception is actually due to a communications breakdown. 

IT is an incredibly specialized field. These software and technology experts need to handle everything from server hardware specs to coding for websites and apps. It’s not that they are naturally isolated, but that their work is difficult to translate back to executive level staff. 

Here’s how you can overcome this communication barrier. 

Learn the Basics of IT

The best way to connect with your IT department is to learn how to speak “techy.” 

Now, you don’t have to learn how to code or start building computers from scratch, but you do need to know the nuts and bolts of this side of your business. Knowing the basics of how websites, apps, and networks operate will give you the linguistic tools you need to communicate with your IT staff. 

This opens up new insights into what goes on in those server rooms. You’ll be able to get a better grasp on the work being done by your IT department and better connect that labor with your overall goals and operations. 

Hire Someone Who Speaks Tech

Don’t have the time to learn what a SAST Analysis Report is? This is where you can skip the tutorials and hire someone who can speak both tech and business. 

There’s plenty of technology experts out there that have shifted their careers away from maintaining networks and coding applications to working in finance, marketing or business adminstration. These experts have vital insight into what’s going on in your IT department as well as the ability to translate these technical topics to the rest of the company.

These employees do a great job of bridging this highly specialized divide.

Leveraging Your IT Department

Now that you’re speaking the same lingo as your IT department, what are you doing to better leverage the work that they’re doing?

If your IT department is just there to change the ink in your printers, then you’re not getting the most out of these technical experts. We’re living in a digital age and this means that we need to take every advantage we can get when it comes to working in cyberspace.

Here are three key areas where your IT department can improve your operations. 

Improving Products, Interactions, and Marketing 

Your IT department has the finger on the pulse when it comes to what’s going on with your products and services. Not only are they the ones that are physically implementing the strategies developed by your marketing department, but they’re also the people in charge of the technology that handles your sales, bookings, and other interactions with your clients.

This makes your IT department the focal point of your business. 

Rather than pushing the IT department further into their silo, you can bring them out and have them play a more central role in these important customer-focused interactions. With so much of today’s business happening online, it is more important than ever that your IT department has a seat at the table when it comes to discussing new strategies for increasing your revenue. 

Their insights into your digital presence will prove to be invaluable the next time your company sits down to decide on the next course of action. 

Excluding IT from this process is like assembling a jigsaw puzzle knowing you are missing an import piece.

Lowering Risks

The IT staff are now front-line employees when it comes to mitigating the risks that your company faces. Your IT staff are at the front-line battling cyber criminals, protecting your company assets, and keeping your client’s information safe.

It all starts with the fact that so much of our business has shifted into the digital realm. Even if you’re not processing digital sales, you still have internal servers that are housing customer data as well as sensitive financial information. If your business suffers a data breach in this information it’s leaked to the outside world, your company could be facing serious financial problems.

Hacks and data breaches are leading causes for damages to a company’s reputation. They can also be the source of expensive and time consuming lawsuits. Your IT department maintains a core aspect of your company’s overall security. 

Controlling Costs

Your IT department also has an important role to play when it comes to controlling your costs. It might not seem like your IT department has a lot of pull when it comes to your overhead, but you’d be surprised how involved the IT departments of businesses across the country are.

Even the most basic IT departments are constantly balancing complicated scheduling processes using resource demanding tasks. The development lifecycle for websites and applications is dynamic and constantly shifting. The scheduling and planning expertise that’s being developed in your IT department is something that the rest of your company can take advantage of when it comes time to control some costs.

Your IT department is also developing unique insights into the overall operations of your company. They have been busy implementing your digital presence, they’ve also been gathering data and observing how their work connects to your company at large. One of the smartest moves to make is to take advantage of all of the R&D potential that is waiting in your IT department 

IT is the New Status Quo—Embrace The Potential 

If there is one take away for how you can change your relationship to your IT department, it’s that the new status quo of global business is based on this technology. Could you company continue to operate without computers or the Internet?

We’re all online and we’re all looking to do business in the digital world. Your IT department can connect you with exciting and new potential as long as you take the time to learn how to communicate with them. 

About the Author

Jay LaBonte is the award-winning author of the bestselling book, Your Guiding Genius: Building A World Class Team. Jay holds a Master’s Degree in Computer Information Systems and is a Certified Employment Law Specialist. With over thirty years experience managing teams of all sizes in various industries, he is no stranger to team leadership and has raised the bar on team building. Mr. LaBonte currently provides IT consulting services through Paradigm Systems, LLC. and is one of the foremost experts on Multivalue database performance tuning and administration. You may contact him by visiting www.paradigm-systems.us.


Does your Disaster Plan include your Cloud Provider shutting you down?

February 2, 2021

Many businesses rely on cloud services to keep their data secure and provide the technology infrastructure that keeps their business running from day to day. What would you do if your cloud provider simply shut you down, permanently?

This is the problem Parler is facing first hand, following the suspension of services by the AWS cloud hosting service provider. Amazon AWS announced that it would no longer be providing services to Parler for allegedly violating its terms of service. The news came shortly after what AWS considered a hate-filled rant posted on the Parler network about a video by Mitchell Obama criticizing Donald Trump’s leadership when he was president. Parler, a popular social media platform frequented by conservatives, had recently begun garnering a huge following, which AWS has been shut down without warning and is now on the verge of disappearing, even though Parler is protected from liability of user generated posting under section 230, in the same way Facebook and Twitter are protected.  

With a market dominated by only a few providers such as Amazon AWS, Google Cloud, Microsoft Azure or Oracle Cloud, if your provider shuts you down and the other providers refuse to take you on as a client, what are you to do?

The Amazon AWS shutdown of Parler has only amplified the fear and ambiguity surrounding cloud outage and downtime. As the industry tries to assess the aftermath of such cloud outages and the impacts they have on users, we are impelled to think that if such powerful providers can shut down a business at a moment’s notice based on what one of that businesses clients did, they could do this to any site hosted on their system.

As for the Amazon AWS and Parler issues, this is for the courts to decide. This article is only using this as an example, as to what could happen if cloud providers are permitted to shut your business down based on a violate of their terms and conditions.

Realistically, there may be a very small probability that your services would be shut down in such a manner, but it is something that we should all consider. Especially if you are using a smaller third-party cloud provider, unaware that they are subcontracting hosting services from AWS or one of the other primary providers. You may think you are on some private companies cloud service when in fact you are hosted as a group amoung other clients on an AWS or other providers servers and are subject to their terms and conditions. So, what happens if your small cloud provider has a client that violates the AWS policies and your cloud provider is shutdown, with you along for the ride?

One common mistake that customers who subscribe to cloud hosting services make is to assume that aspects like data protection, privacy, and compliance are their service providers’ responsibilities. However, Service Level Agreement (SLA) guidelines put most of the responsibility on the customers’ shoulders in times of crisis. A cloud outage can range from a few seconds or minutes, to hours if not days. During this period, all or some of the cloud infrastructure services may be unavailable for client use.

Just because you run your services are on the cloud, doesn’t mean you won’t experience an outage. In March of 2018 Amazon Web Services experienced an outage that affected IT solutions providers Atlassian, Slack and Twilio and also affected its own voice assistant, Alexa for several hours. On January 24, 2019 Microsoft Office 365 became unavailable, affecting 1.2 billion users and just under a week later they had a second outage. In March 2019, Googles Gmail service was down for 4.5 hours.

A few minutes of no email services may be uncomfortable for a company but not detrimental. But can your company withstand more than a day of no email services? Maybe. But what about a service outage of days or weeks? Assuming you have a valid contract with your cloud provider and your cloud vendor is in violation of that agreement for whatever reason. It can take days or even months to resolve the issue in court, let alone getting a court ruling. So, what happens to your business during this period? Will you have access to your backups? Are you heavily dependent on the cloud providers API’s and other software?

So how can you minimize the risk of your business being brought to it knees by a cloud outage? You may want to consider hosting on multiple cloud services if your business is time-sensitive. This prevents you from being locked into a single provider. It is also advisable to stay away from custom API’s provided by your cloud vendor. Cloud providers often provide API’s to make it easier to develop your services, but they also serve to lock you into their platform. Consider utilizing open-source technology so that you can run the same software on several cloud platforms, which helps simplify disaster recovery efforts. In some cases, using open-source solutions may require additional cost for development and maintenance, but in the event of a disaster, it will be money well spent.

Another aspect of disaster preparation is backups. While your cloud services provider may back up the data for you, they may not always be obligated to do so. Just as you would backup on premise databases, you should also regularly back up whatever you store in the cloud, such that valuable data is maintained and not lost in the event of a cloud failure. It is important to ensure you back up software and data to a location that is not controlled by the same cloud vendor. This ensures access to your software and data in the event of a cloud provider outage, and prevents the provider from holding your data hostage, pending determination by the courts.

If you absolutely want to have complete control over your environment, then it may be time to do away with cloud services entirely and go back to traditional systems and focus on managing data using in-house servers. After all, on-site premise servers like company websites have been and continue to be used by many organizations and employees to store data and are backed up using tapes and/or hard drives. This way, you have all the control of your data and resources but you can still be affected by unexpected outages and downtime. However, the major concern with storing an organization’s data on-premises is security. A fire or other natural disaster could also take your business offline.

So, should you consider bringing your services back inhouse? Probably not. The cloud offers many advantages to inhouse hosting. Scaled capacity, secure facilities and redundant internet and power connections are key advantages to cloud-based hosting. However, even if you are using cloud providers to host your services, it is best to heed the age-old adage, “Don’t put all your eggs in one basket”. Make sure you perform regular backups of your software and data to a location where you have access, should your cloud provide become inaccessible. Just because you are using a cloud provider does not mean your business is safe from disaster.

About the Author

Jay LaBonte is the award-winning author of the bestselling book, Your Guiding Genius: Building A World Class Team. Jay holds a Master’s Degree in Computer Information Systems and is a Certified Employment Law Specialist. With over thirty years’ experience managing teams of all sizes in various industries, he is no stranger to team leadership and has raised the bar on team building. Mr. LaBonte currently provides IT consulting services through Paradigm Systems, LLC. and is one of the foremost experts on Multivalue database performance tuning and administration. You may contact him by visiting http://www.paradigm-systems.us.


Unleashing Potential: The Pitfalls of Micromanagement and the Power of Empowerment

July 9, 2023

Micromanagement is a widely recognized management style that can have detrimental effects on both productivity and employee well-being. It is important for leaders to understand the negative repercussions of this approach and explore alternative strategies to foster a more empowering work environment. By recognizing the drawbacks of micromanagement and adopting empowering strategies, managers can create a culture that nurtures growth, collaboration, and success.

How to Tell if You Are a Micromanager

Identifying whether you exhibit micromanagement tendencies is crucial for personal growth as a leader. Here are some signs that indicate you might be a micromanager:

  • Control and Perfectionism: Do you find it challenging to delegate tasks because you believe no one can do them as well as you? Are you constantly seeking perfection in every aspect of the work? These traits often indicate a tendency to micromanage.
  • Lack of Trust: Do you frequently feel the need to monitor every step of the process? Are you reluctant to give autonomy and decision-making authority to your team members? If trust is lacking in your interactions with employees, it may indicate a micromanagement approach.
  • Ineffective Time Management: Do you spend excessive time checking on the progress of tasks or requesting frequent updates? Are you unable to let go of smaller details and focus on strategic aspects of your role? These behaviors can signal micromanagement tendencies.
  • Lack of Employee Empowerment: Do your team members hesitate to take initiative or make decisions without seeking your approval? Are they overly reliant on your guidance for even minor tasks? If employees feel disempowered and dependent on your constant input, it may be a sign of micromanagement.
  • Low Employee Morale and Engagement: Are your team members disengaged or showing signs of frustration? Do you notice a lack of enthusiasm or creativity among your employees? These indicators may suggest that your micromanagement style is negatively impacting employee morale.

By reflecting on these behaviors and being open to feedback from your team, you can identify and address micromanagement tendencies. Building self-awareness is the first step toward embracing a more empowering leadership style that fosters collaboration, growth, and success.

Impact on Productivity

Micromanagement can have a significant impact on productivity within an organization. When employees feel excessively controlled and closely monitored, their motivation and creativity suffer. Instead of being empowered to make decisions and take ownership of their work, they become disengaged and lose the drive to excel. This lack of trust and autonomy hampers their ability to contribute fully to the organization’s success.

Moreover, micromanagement leads to the inefficient use of time and resources. Managers who engage in micromanaging behaviors spend excessive amounts of time reviewing and scrutinizing every task, slowing down decision-making processes and hindering progress. By focusing on minor details and constant monitoring, both the manager and employees are distracted from more strategic goals and tasks that could drive growth and success.

Erosion of Trust and Well-being

One of the most damaging consequences of micromanagement is the erosion of trust between managers and employees. When managers exhibit a lack of faith in their employees’ capabilities by closely monitoring their every move, it sends a clear message that they are not trusted to do their job effectively. This lack of trust negatively impacts employee morale and job satisfaction, leading to decreased well-being and increased stress levels. Employees may feel undervalued, restricted, and disengaged from their work.

Additionally, micromanagement contributes to a culture of fear and anxiety within the workplace. Employees are constantly on edge, fearing criticism or reprimand for not meeting the manager’s expectations. This constant pressure and scrutiny can lead to burnout, decreased job satisfaction, and even higher turnover rates. When employees feel micromanaged, they are less likely to take risks, be innovative, or contribute their best efforts.

Benefits of Embracing Empowerment

In contrast, embracing an empowerment approach can have numerous benefits for both employees and the organization as a whole. By trusting employees and granting them autonomy, managers foster a sense of ownership and accountability. Empowered employees are more motivated, engaged, and willing to go the extra mile. This leadership style encourages open communication, collaboration, and personal growth, resulting in increased productivity, job satisfaction, and overall organizational success.

When employees feel empowered, they become active participants in the decision-making process. They take ownership of their work and are motivated to achieve results. By giving employees the freedom to make decisions and take calculated risks, managers can tap into their full potential and unlock creativity and innovation. Empowered employees are more likely to contribute new ideas, problem-solve effectively, and proactively seek opportunities for growth and improvement.

Strategies to Overcome Micromanagement

Clearly Define Expectations

Establish clear expectations and communicate them effectively to employees. Providing a framework for autonomy within defined parameters allows employees to take ownership of their work while aligning with organizational goals. Clearly outlining the desired outcomes and performance metrics helps employees understand what is expected of them.

Delegate with Trust

Delegate tasks based on employees’ skills and capabilities. Offer guidance and support, but avoid excessive monitoring. Trust employees to complete their work and provide assistance when necessary. This approach allows employees to develop their skills, gain confidence, and take ownership of their tasks.

Foster Open Communication

Create an environment that encourages open communication. Actively listen to employees, value their input, and provide constructive feedback. Regularly check in with employees to understand their progress, challenges, and ideas. Involving employees in decision-making processes when appropriate helps build trust, fosters collaboration, and promotes a sense of ownership.

Support Employee Growth and Development

Invest in employee development through training programs, mentorship, and opportunities for advancement. Provide resources to enhance their skills and encourage continuous learning. Offer regular feedback and recognition to acknowledge employees’ achievements and contributions. Supporting their professional growth empowers employees and shows a commitment to their success.

Lead by Example

As a manager, it is crucial to lead by example and demonstrate trust, transparency, and respect. Avoid micromanaging behaviors and instead, provide guidance and support. Encourage autonomy, creativity, and independent thinking. Set realistic expectations and give employees the freedom to find their own solutions.

Create a Culture of Trust

Build a culture of trust by fostering open communication, encouraging collaboration, and valuing diverse perspectives. Establish a supportive and inclusive work environment where employees feel safe to take risks, voice their ideas, and contribute to decision-making processes. Trust is the foundation for empowerment and can significantly enhance employee engagement and job satisfaction.

By implementing these strategies and embracing an empowering leadership style, managers can overcome micromanagement tendencies and create a positive work environment that fosters employee growth, productivity, and satisfaction.


Big Brother is Alive and Well

May 6, 2021

We know that no one ever seizes power with the intention of relinquishing it”. ~ 1984 by George Orwell

As a child growing up in the ‘60’s and ‘70’s I witnessed first-hand the birth of the internet and it felt like a sci-fi novel come true. Most people born in the Internet age don’t appreciate what it means to send a message from a laptop in West Palm Beach Florida to someone over 3,000 miles away in Sacramento California. With the click of a few keys and the press of a button and whoosh, your innermost thoughts are broadcast into a sea of thirsty minds and hungry hearts. It was this mechanism that had given the free thinkers hope. Finally, we were able to connect, share information, and build a community that could not be policed or disrupted due to the nature of the early internet. It was a mesh network of individuals, as soon as one computer or website went down, ten more popped up in its place.

It was what some called the collective consciousness, a web of thoughts and ideas that allowed both bad and good thoughts to meet the eyes of millions. It was a place where the free exchange of idea’s meant only the best ideas could flourish and the terrible ones went off to die in the eternal ethers of the boundless internet. This kind of reach was what made the internet so wonderful, so powerful, and yet, so dangerous. 

Then came the money.

As the internet grew in popularity, progressive companies like Jeff Besos’s Amazon began to recognize the virtually infinite money that could be made from the internet with very little work required. Although not yet disruptive, the initial tech boom on the internet would forever carve out the inner workings of today’s omnipresent surveillance system.

Once Amazon, Microsoft, Google, Facebook, Twitter and others began to reap the benefits, it was soon found out that the internet had more than just money to offer. No, the internet was becoming the prevailing force of the world. The very thing that not only tied us together but also the thing that kept our daily lives running smoothly. Rapidly, the internet morphed from a fun hobby to a thing of necessity. So much so that your life cannot exist as you know it without the internet and the many side effects that come with it. 

Want to pay a bill? You need the internet for that. Want to get a job? You need the internet for that, no one takes walk-in applications, no one wants a handwritten resume. Want to keep up in the marketplace of careers? You need the internet for that. Want to drive your new Tesla, or turn on the tv? You guessed it; you need the internet for those things too. Lost your job and want to apply for unemployment or send a message to a loved one? You need the internet. The internet has now become almost something like an extension of the self in that regard. Not having the internet in modern society is almost akin to cutting a piece of yourself off and feeding it to the wolves, without it, you are nothing (at least in mainstream society). 

That notion wasn’t just an unfortunate truth however, the powerful companies also quickly realized that the internet was what kept people alive, it was what kept goods moving, what got food to your grocery store or even to your front door. The internet was the thing keeping hospitals running, police systems working, and most insidious of all, the internet was the thing that could influence the thoughts of entire generations without them even realizing it. 

Big Brother, Big Tech

Whether you’ve read 1984 or not, you likely already know the quality of Big Brother in the world of 1984. An omnipresent machine, something which records, recognizes, and spits out the will of whoever controls it. In several scenes, the main character, Winston Smith, sits at home before his prescribed job, he sits before a large screen in the middle of his home. This screen spits out the daily propaganda and records his reactions and behavior to said propaganda. Much like George Orwell’s vision of the “screen” so too does the internet of today act similarly. Yet, what most do not realize is the Big Brother of today is more hidden, more secretive, more “in the shadows” about its surveillance operations. 

Your Online Footprint

It first began with your computer browser. As Big Tech grew in power, they also sought ways to record, analyze, and influence your online behavior. The invention of online tracking tools like “cookies” and browser data was silently introduced to watch your behavior online. If you visit a webpage, how often do you visit? What parts of the website do you look at the most? How long do you spend there, do you tell anyone about what you saw there? These kinds of questions are all captured within this online system under the guise of selling you more products. Yet, of course, the government was watching. The opportunity to monitor the most interactive of behaviors was capitalized upon and deals quickly made where companies could track your behavior on the internet, hand it over to the government, all the while facing no oversight, no regulations, and certainly no consent from the public. Because the Google’s and Microsoft’s of the world are private corporations, and because they hold more power than entire nations themselves, this meant you, the internet user had no say in how this data is collected or used.

The Online Privacy Information Center (epic.org) notes “There is a significant disconnect between the type of tracking that companies are engaged in on the web and what people know or think is occurring.” (EPIC). Even beyond your internet behavior, the devices collecting data began to creep ever more into the real-world behavior of the public. 

The American Bar Association says, “a cell phone may send data regarding its location thousands of times a day.” (ABA). Even worse, for those who are privacy-minded, some companies like Google have been caught monitoring your location even if you turn that function off. “Google services on Android devices and iPhones track and store your location data even if you turn location history off in your privacy settings, according to an Associated Press investigation.” (CNET). In essence, any Big Tech company, an app developer, any private company can and will track your every movement and be subject to providing that information to the government in secret without you ever knowing about it. 

Much in the same way Big Brother would monitor behavior and weed out dissidents, secret courts in the United States have been hard at work monitoring the internet behavior of the U.S. citizens and issuing arrest warrants for those it deems “a threat to national security”. Although it sounds like a good idea to track and monitor potential threats, it begs the question, to what extent is someone considered a threat? What if someone publicly opposes a new policy or politician. What if a reporter finds out damaging information about a new candidate or rival? Welcome to the secret world of FISA courts (Foreign Intelligence Surveillance Court). But, don’t be fooled by the “foreign” part of the name. NPR reports that a FISA court cannot be petitioned to disclose who or why an American citizen is being “wiretapped”. Or in other words, if an agency with an agenda doesn’t like what you’re doing or how you’re talking, they can petition a court to legally set up a wiretap on you, your internet behavior, your speech at home, who you associate with, where you are at certain times of the day and more.

Even in the case of powerful people, like when Trump was running for office in the 2016 presidential elections (regardless of how you feel about him), a secret FISA court granted the FBI access to track, monitor, and record ALL information about Trump, his campaign, and more. “What they found were serious errors with the FBI’s surveillance on former Trump campaign aide Carter Page. They documented 17 significant inaccuracies and omissions in the bureau’s applications to wiretap Page.” (NPR). All of this without the monitored parties knowing about it, or being able to petition against it. Even worse, was that the Trump campaign and others like it were monitored because they posed a political threat to the establishment. Now imagine the average joe who posts information about crimes of the currently in charge administration. Imagine a journalist is getting close to spilling the beans about something a powerful person did. A secretive FISA court can and will issue a complete, pervasive, and undetectable wiretap on that individual all because they committed a thought crime. Even more frustrating, the means of that monitoring is not carried out by the government, but rather Big Tech, the modern-day Big Brother.

It’s not just your behavior

Your internet behavior and location are not the only things subject to Big Brother, but so too is your speech. Back in June of 2015, Amazon released a new product, something we’ve all come to know and most of us have in our homes, “Alexa”. Similarly, Google released Google Assistant and many other companies have followed suit. These types of “always-on” devices have fortunately caught a lot of attention with privacy advocates who filed suit with the FTC alleging these devices violate federal wiretapping laws. However, the power of Big Brother has meant that these devices continue to always record all conversations and speech within your home, and those recordings are accessible to the employees of those companies without any need for warrants, because users have accepted the terms of use agreement that accompanies those devices, most likely with out even reading the agreement.

What Big Brother Says Goes

Aside from monitoring your speech/behavior/location, Big Brother has also taken to censoring and even punishing people who do not commit crimes or speak out against the status quo. Perhaps most noteworthy of the bunch is Twitter and Facebook, who over the past four years have continuously sought out and silenced or banned people who speak out against the Main Stream Media, CIA-backed narratives or whatever political candidate those company’s support.

**Side Note – Yes, the U.S government and CIA have admitted to planting CIA operatives within all mainstream media organizations. To learn more about the CIA influencing mass media, simply visit https://www.refworld.org/docid/47c567c020.html.**

In many instances, speech on Twitter is not only banned, but police actively show up to people’s places of work or their homes. In one case a man in England was visited by police at his place of work. The police admitted that no crime was committed, but that the individual’s particular tweet had offended someone and was reported as a “hate incident” (The Guardian). This leaves open the slippery slope of allowing Big Brother to punish those who do not partake in the mainstream narratives. At the same time, companies like Twitter and Facebook claim they have no obligation to protect individuals’ rights to free speech/expression because they are privately held companies. Yet, in a world where your voice is mostly only heard on public utilities like Twitter, it begs the question, do monopolies who hold platforms based on speech have the right to police speech protected under the 1st amendment. For now, their fancy lawyers and those easily offended on the internet cry yes. Even if it means effectively silencing millions of otherwise honest, fair, and decent human beings. 

2+2=5

Yet, Big Brother has not stopped with policing free speech online, Big Tech has even gone so far as to implement “The Ministry of Truth”. Just like in George Orwell’s 1984 novel, modern-day tech companies seem more eager than ever to re-write history and “set the record straight” according to what they want people to think and feel. Take for instance the notion of a “fact check”. In many cases, these “fact checks” are done by individuals with clear biases, with very one-sided narratives, and often blatant disregard for reality, all in the name of preserving Big Brothers Ministry of Truth. 

Even more “unseen” is Big Brother’s use of algorithms to hide and censor certain information they deem damaging to their cause. This is most evident when performing a Google search versus a “Duck Duck Go” search. The two companies use the same initial information to pull up search results. Yet, Google “curates” their search results so that each user is given Big Brother-approved propaganda instead of the cold hard truth. 

Light at the end of the tunnel

All of this may seem like the fight is already lost. Much like the end of 1984 when Winston finally gives in and says 2+2=5, you may feel helpless in the sea of insanity and censorship. Yet, not all is lost. In the fight for freedom, new platforms which evade Big Brother’s grasp are becoming ever more popular and prevalent. Odds are if you enjoy using one of Big Brother’s platforms, there is an alternative that prides itself on free speech and common sense. With all the modern-day similarities to Big Brother, one thing couldn’t be further from the truth. There is still fight left in those who value free thought and who detest thought crimes. The core tenets of the internet mean that free speech and the thought marketplace continue to flourish on alternative platforms with developers working around the clock to protect your privacy, your rights, and the foundation of a free society.

About the Author

Jay LaBonte is the award-winning author of the bestselling book, Your Guiding Genius: Building A World Class Team. Jay holds a Master’s Degree in Computer Information Systems and is a Certified Employment Law Specialist. With over thirty years’ experience managing teams of all sizes in various industries, he is no stranger to team leadership and has raised the bar on team building. Mr. LaBonte currently provides IT consulting services through Paradigm Systems, LLC. and is one of the foremost experts on Multivalue database performance tuning and administration. You may contact him by visiting http://www.paradigm-systems.us.