Govt10: The surveillance state and society (v1.0)

Key reference is Prof Paul Rosenzweig of George Washington University. 

Every day, for good or ill, what you do and what you say is under scrutiny—scrutiny from your friends, your coworkers, and your family, but also from the U.S. government, foreign governments, and large commercial data collectors (which could be accessible to governments under certain circumstances. Or the data may be sold to generate income). Also, bad actors or rogue states have increasingly targeted, with the intent to steal, central repositories of personal data with cyber-attacks. There are also many central stores of such data in most organizational databases which are potential targets for cyberattacks. 

Three trends are driving the growth of surveillance capabilities.

  • The proliferation of new sensor platforms. Around the globe, we have new and innovative ways of capturing information and data. They range from license plate readers and citywide television camera systems to drones, searchable DNA record stores, personal information capture and storage via many devices, apps and websites, email apps, social media apps, geolocation systems, fingerprint capture and matching system, facial capture and recognition systems, and other novel ways of collecting data.
  • The increased power of data analytics to do correlation analysis and searches of disparate data streams. Powered by Moore’s law—the seemingly perpetual doubling of processing capacity—algorithms today can find patterns in immense volumes of data, and it could increasingly be augmented by AI for even more complex analytics. They often consider billions, if not trillions, of data points as part of the analysis. The cloud has millions of computers and forms an even larger pool of processors to perform even more complex analytics.
  • The ever-decreasing costs of data storage. We can imagine a world in which everything is digitized and stored permanently.

The result of all of this is we are in a defining moment with a need for a fundamental restructuring of the relationship between the government and the individual and of rights with regards to commercial data collection. Technology develops so fast that it far outstrips the capability of law and policy to adapt, leaving new surveillance techniques in an ungoverned, lawless domain. Meanwhile, the need for secrecy in some of our surveillance operations makes it difficult, if not impossible, for citizens to be fully informed about what their government is doing in their name. There is also a inherent tension between secrecy and transparency, security and freedom/privacy/civil liberties, ethical and practical, accountability and effectiveness, and limited government and effective government. These are hard conflicts to resolve and often there are big conflicts between executive departments or between the legislature, courts and/or the executive or by individuals launching lawsuits before a resolution is arrived at. Lastly there is investigative journalism and scrutiny by organizations like the ACLU. 

 Surveillance comes in three basic forms. Physical, electronic (also called signals), and Dataveillance (byproduct of internet and global communications systems and includes personally identifiable information - PII). As the storehouses and transmissions of PII and other data have grown, so have commercial and government efforts to use this for their own purposes. Also, PII stores are ripe for for picking by cyber thieves. The government used all of these forms in a coordinated way to track down and eliminate Bin Laden. TSA automatically uses the PII entered during your plane reservation to check against the TSDB database of persons of interest who could be potential threats (called the secure flights program). This was upheld by the courts. But what if there is a mistake in the no-fly list? A number of individuals were unable to fly for years. A court verdict upheld the rights of individuals to have a process to have their names removed from the list.  

 In China, surveillance is quite pervasive and accepted as normal and is at one end. In Europe, there is far more emphasis on individual rights and is at the other end. The US is somewhere in-between. In the US, a lot of focus is on who is watching the watchers, and appropriate oversight. Nobody wants a German style Stasi system to emerge here. 

There are many documented abuses and excesses that were surfaced by the Church/Pike/Rockefeller commissions in mid-70's with program names like MOCKINGBIRD, MINARET, HTLINGUAL, and COINTELPRO. George H W Bush when CIA director laid down the marker that the CIA will never again form contractual relationship with media for propaganda purposes. The Keith court case upheld by the Powell supreme court established that a court approved warrant was needed before domestic electronic surveillance even for national security threats. 

Post 9/11 the office of the DNI (Director of National Intelligence) was created to coordinate across 17 intelligence agencies. Also, the NCTC (National Counter Terrorism Center) was also created to connect all the dots with representation from both the intelligence agencies and law enforcement agencies. The PATRIOT Act of 2001 tore down the wall between law enforcement and intelligence officials so that they can share information and work together to help prevent attacks. It also made it more difficult for terrorists to launder money in the US. Some of it is permanent while other parts have lapsed or struck down. Critics point out that it forgoes the need for credible proof of criminal activity to indefinitely detain a suspected terrorist. It weakens public oversight of the US government, law enforcement, and intelligence agencies. It also potentially subjects US citizens not under suspicion of terrorism or any other criminal activity to increased surveillance measures. The Patriot Act was not renewed in 2020 and another act called the Freedom act of 2015 that rights many of the Patriots acts abuses is currently in effect. 

The key oversight mechanisms in place today are congressional oversight (the senate and house select intelligence committees), the second is senate confirmation of key intelligence positions in the executive, the third is congressional control of the purse, the fourth is congressional power to do an investigation, and the fifth is FISA act and the FISC court. The FISC court entertains applications submitted by the United States Government for approval of electronic surveillance, physical search, and other investigative actions for what is substantially foreign intelligence purposes and to authorize surveillance of foreign agents (even Americans). Lastly there are investigative journalists and organizations like the ACLU keeping watch. 

But today the threats from surveillance have increased substantially by big data analytics, and the laws have not caught up.  There is a huge amount of your financial data in corporate databases. Every click you make, website you visit, cell phone geo locations, phone call metadata, or purchases are cataloged and stored somewhere. What is even more problematic is companies that collect such information often sell it and the government is one buyer. This is magnified by how pervasive it is. The NCIC is a centralized computerized index of criminal justice information (i.e.- criminal record history information, fugitives, stolen properties, missing persons).  But data aggregators have also amassed birth records, marriage records, credit records, conviction records, real estate transactions, liens, and bridal registries among others.  One company for example holds on average 1500 data points on each adult!! All this information can be integrated together to form a very clear picture of you. It could be used to find new threats or under unscrupulous hands be used to find information about political opponents or protesters. Political candidates often use commercial and other data to create targeting campaigns. ATS - a big data system - is used by homeland security to screen incoming passengers into the US to identify those who should more thoroughly be interrogated, and it has been quite successful. Today, big data is a part of your life, whether you like it or not. 

Three pieces of more modern data need further clarification and are areas for more policy formulation - biometric data, geolocation data and the internet of things. I will do so now.  

Biometric data include iris recognition, fingerprint recognition, DNA matching (most accurate), voice recognition, hand geometry recognition, gait recognition, and facial recognition. There are many places where one’s identity has to be clearly verified or identified.  Identification systems provide a score of how close the match is and have different degrees of accuracy. Biometric systems require an enrollment process where the biometric is stored in a searchable form. For it to be useful, the database has to be accurate and comprehensive. Facial recognition and fingerprint recognition is increasingly used for identification in a widespread way with cell phones, including actions and transactions initiated with other companies with that cellphone. Facial recognition and voice recognition and gait recognition can be done with samples taken covertly without the subject's permission. DNA matching is interesting because even if you are not in the database, it will match against a blood relative and make an estimate of the relative's relationship to you. The supreme court ruled that the DNA sample may be collected even merely after an arrest. There are also stores in ancestry companies like 23andme and ancestry.com. Biometric data poses a host of policy questions.  

Geolocation devices allow you or an object to be tracked quite accurately (with today's technology within less than 10 feet!!). These include GPS trackers attached to vehicles, your cell phone including texts and voice messages from that phone, and very small trackers like air tags for kids, pets, keys, wallets, luggage, etc.  GPS also is used in navigation systems. Some apps in your cellphone constantly emit location data. The supreme court ruled that trackers cannot be used by law enforcement without oversight. But voluntarily given data including cellphone data can be shared with law enforcement with a subpoena. But there is a host of policy questions posed by geo location data. 

Communication capabilities are showing up in very small devices and also household appliances (called internet of things) all over the place. Insulin pumps, cameras, toasters, thermostats, electricity meters, refrigerators, glucose continuous monitoring devices, even items tagged in a store. These are not very secure and can easily be hacked. Also, they can generate huge quantities of data in aggregate. The companies that own the data are interested on its commercial value and not too focused or have the incentive for privacy or security. There is a host of policy questions posed by internet of things. 

Look towards the future and examine the possibilities of quantum computing, human-computer interfaces, and artificial intelligence. These technological changes are going to require each of us to make decisions about privacy and security for ourselves and future generations. Government also will belatedly struggle to formulate appropriate policies as each challenge arises. Not too worried about the US government since there is good oversight. But a vulnerability is a Wanna-Be-Dictator can become the president. He could potentially subvert the oversight processes that keeps the US system in check, by withholding information to congress or covertly weaponize the data against political enemies. Technology has given a dictator in some other country the tools for full surveillance. But I am very afraid of cyber criminals and rogue states getting access to the troves of US data. My next essay is on cybercrime and cyber wars. 


Comments