We’re all data in the end: the rise of the surveillance state

surveillancestateby Yassamine Mather

Edward Snowden’s revelations about internet and phone surveillance by the Government Communication Headquarters (GCHQ) in the UK and National Security Agency (NSA) in the US did not come as a surprise to anyone with knowledge of the current state of communication technology and the extensive use of the ‘terrorist’ threat as an excuse to spy on citizens – as well as gathering information about other states. The surprising elements can be found in the detail: for example, the extent to which GCHQ and MI5 set up traps to capture data during the G20 conference in 2009:

“Setting up internet cafés where they used an email interception programme and key-logging software to spy on delegates’ use of computers; penetrating the security on delegates’ BlackBerrys to monitor their email messages and phone calls;  supplying 45 analysts with a live round-the-clock summary of who was phoning who at the summit”; as well as “reading people’s email before/as they do”.1

Engineers and scientists, who were amongst the first academics using email in the 1980s, were well aware that this new form of communication was susceptible to interception and surveillance. Indeed, they warned new researchers and students to treat this electronic form of communication as if they were sending an open letter: ‘Don’t put anything in an email you wouldn’t like everyone else to know about.’ This community knew that every email could be read by state research and spying institutions. In those days, security forces were targeting Marxist groups for surveillance and many academics (mainly non-political scientists and engineers) took it upon themselves to shield email users from the security forces. For years, every scientific email sent between the Massachusetts Institute of Technology, Imperial College and a host of universities involved in joint computing or engineering projects with them ended with a long list of words used by the CIA and MI5 to track leftwing students/activists. So it would be no surprise to get an email about, say, ‘Advances in transputer technology’ containing tag words such as ‘Marxism’, ‘Leninism’, ‘Red Army Faction’, ‘Baader Meinhof’, etc. Extensive use of key search words in every email was a way of combating state surveillance of individual messages. Distributed computing and the internet have come a long way since then, yet the majority of IT users are unaware that collection of personal data happens constantly – remotely in automated systems – or that databanks are used by both states and private companies to store the information.

With the exception of remote rural areas in some third-world countries, it is normal for states, charities, NGOs and private firms to use computers to save data about us. Everyone’s medical, employment and tax details are recorded by the state, and in addition banks and financial institutions store the data collected every time we use cards, cheques, direct debit, etc – not just about our salaries, debts and other financial details, but every aspect of our private lives. This data can be used by the state and the security forces. In addition, metadata companies are making profits by selling profiles of our lives obtained from all the above sources to private companies which use the data for personalised, targeted adverts and marketing.

Increasingly, online sales websites encourage us to use Facebook accounts when making an enquiry or a purchase. There are good reasons for this. Facebook associates our online behaviour and that of our friends with our consumer profile offline, so that we can be grouped for marketing and advertising purposes. Companies use this information to create a profile of every customer for the purpose of targeted advertising. This form of advertising is more efficient than, for example, sending spam emails which offer breast implants to male users or hair transplant remedies to young women.

A reporter from the US magazine, The Atlantic, used a tool called Collusion to find out who was tracking his internet usage and found that, during one 36-hour period, 105 companies were doing so.2 It is easy to see how the same profile could be put to more sinister use not just by an Orwellian state, but by fascist sympathisers, megalomaniacs or even the ‘democratic’ security services.

It is well known that providers keep connection and login records, including IP addresses (the unique identifier of the connection you use either on broadband or wifi) and that states can demand access to such records. In both the US and UK, the authorities need a warrant from a judge to search physical property. However, rules governing virtual property searches – be it for emails or files held on computers – are far more lax. According to Google’s own admission, between January and June 2012, United States law enforcement agencies requested data for 16,281 Gmail/Google accounts and the company complied with 90% of them. What is interesting about the Prism surveillance program operated by the NSA is that the agency has used legislation such as the Patriot Act and US Foreign Intelligence Surveillance Court rulings to “make use of inadvertently acquired” domestic communications, whenever they were believed to contain any information relevant to cybersecurity – and in this, they had the IT companies’ full cooperation.

Public and private sector cooperation in this is remarkable – and it is likely to continue as long as capitalism and the market exist.

NSA operations

The National Security Agency, which was at the centre of Snowden’s whistle-blowing, has access to more than the above. Satellites constantly record our location using data beamed from cell phones to complement CCTV records, and the NSA collects intelligence using geostationary satellites in cooperation with the military forces of ‘US allies’. No wonder the organisation boasts the largest group of supercomputers capable of dealing with metadata. Every day it intercepts and stores 1.7 billion emails, phone calls and other types of communication.3

The NSA is often described as the world’s largest single employer of mathematicians. They have worked on the agency’s advanced encryption programme, while researching into a project named ‘random number generator’ – allegedly used to allow access to all encrypted data using random numbers.

The NSA spends millions of dollars financing academic research. Thousands of research papers submitted to academic journals between 2007 and 2011 mention the NSA as the source of their funding. In response to a freedom of information lawsuit this year, the NSA released a 651-page research paper entitled Untangling the web: a guide to internet research,4 a must-read for anyone interested in the subject. Amongst other things, it shows how searches using Google, Yahoo, Wikipedia, etc can be classified and correlated.

In the US, the debate about privacy and data protection has concentrated on the rights of US citizens, as opposed to anyone else’s – when challenged, the NSA draws attention to information on its web pages5 showing its efforts to avoid spying on private communications; but these relate to US citizens exclusively. The issue has infuriated US allies in Europe and beyond. This commentary by Jakob Augstein in Der Spiegel is one amongst many in the European press: “Those who believed that drone attacks in Pakistan or the camp at Guantanamo were merely regrettable events at the end of the world should stop to reflect. Those who still believed that the torture at Abu Ghraib or that the waterboarding in CIA prisons had nothing to do with them are now changing their views … A regime is ruling in the United States today that acts in a totalitarian way, when it comes to its claim to total control. Soft totalitarianism is still totalitarianism.”6

US senators Ron Wyden and Mark Udall, who are sponsoring a bill on this issue, say that some of the NSA’s statements are inaccurate and misleading: “In our judgement this inaccuracy is significant, as it portrays protections for Americans’ privacy as being significantly stronger than they actually are.”7 For example, the NSA guideline which states, “Any inadvertently acquired communication of or concerning a US person must be promptly destroyed if it is neither relevant to the authorised purpose nor evidence of a crime” is thought to be not worth the paper it is written on. The Obama administration is certain to face more internal as well as international criticism over this question.

Users beware

Although it would be foolish to think we can protect ourselves completely from this type of surveillance, we can, of course, take some basic steps to make life more difficult for the security services. For instance, it is not advisable to use mobile phones for searches made via Google, Yahoo and so on: better to use web browsers, where permissions can be set and cookies (pieces of data sent from the website and stored in our browser enabling it to retain information on a website or activity we have undertaken) can be deleted.

We can use aliases in emails and on Facebook, but security forces are likely to be able identify users from their IP addresses. It is possible to conceal an IP address using a virtual private network, which provides public wifi networks with some security …

But increasingly none of it matters. If a device is connected to the internet, even if that connection lasts just a few seconds, data on it is vulnerable. British Aerospace and other military research institutions have strict rules about internet connections: basically computers holding sensitive data are never connected to the web.

So for those fearful of the “dark side of the internet”, the message is clear: anything that appears anywhere on Facebook or Twitter, in an email or on a blog, can be accessed. As the title of an article in the business pages of the New York Times implies, “Trying to keep your emails secret when the CIA chief couldn’t” is just – well – impossible.8

Notes

1. The Guardian June 16. www.guardian.co.uk/uk/2013/jun/16/gchq-intercepted-communications-g20-summits.

2. www.theatlantic.com/technology/archive/2012/02/im-being-followed-how-google-151-and-104-other-companies-151-are-tracking-me-on-the-web/253758.

3. Priest, Dana and Arkin, William, A hidden world, growing beyond control, Washington Post: http://projects.washingtonpost.com/top-secret-america/articles/a-hidden-world-growing-beyond-control/3.

4. www.nsa.gov/public_info/_files/Untangling_the_Web.pdf.

5. www.nsa.gov/public_info/_files/press_releases/section_702_protections.pdf.

6. www.spiegel.de/international/world/europe-must-stand-up-to-american-cyber-snooping-a-906250.html.

7. http://theatlantic.datinggroud.com/politics/archive/2013/06/2-senators-say-the-nsa-is-still-feeding-us-false-information/277187.

8. www.nytimes.com/2012/11/17/technology/trying-to-keep-your-e-mails-secret-when-the-cia-chief-couldnt.html?pagewanted=all&_r=0.

 


You received this message because you are subscribed to the Google Groups “RedlineNZ” group.
To unsubscribe from this group and stop receiving emails from it, send an email to RedlineNZ+unsubscribe@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.

7 comments

  1. Secularists who do not believe in an omnipotent and omniscient God tend to seek refuge in an omniscient and omnipotent state. This was the case in Stalin’s Russia, Hitler’s Germany, and it is presently the case in Barack Obama’s America, and John Key’s New Zealand. These people believe surveillance and control is necessary for the protection of the state, and the state in turn is necessary to defend the well-being of the people.
    Having no belief in a beneficent and all-knowing God, the secularists believe that they must know everything that has happened or may yet happen in the world, and they consider it necessary to have absolute control over their own circumstances, to whatever ends. Having no belief in the hereafter, they are obsessed with the importance of preserving their lives and their fortunes in this world, even at the price of moral improbity. In attempting the impossible, they find themselves obliged to resort to deceit, and then to force.
    They are wrong, they are misguided, and they are doomed to fail.
    Those who truly believe in God can accept their own limitations, and their own mortality. They have no need to seek refuge in a putatively all-knowing, all-powerful state, because they have a truly all-knowing, all-powerful God. The only imperative for the believers is to honour God while living in the world with honesty, courage and compassion for others, and in the end, they will be vindicated.

  2. There are reasons why, and a process by which, the all-powerful all-knowing state must fail. At the most fundamental level there is a contradiction between omniscience and omnipotence. If we know everything that is, was, or will be, then by definition we are powerless make the slightest alteration to that reality. If, on the other hand, we could change anything in the world, then we could have no knowledge of what will be from the very next instant of time, because there would be no law of nature by which the creation is bound, and all would be subject to our own unpredictable and ever-changing will. So omnipotence signifies the repeal of all natural laws, in the absence of which the patterns of the past would cease to have meaning, and would appear as mere coincidence .

    There is a tenet of science, particularly applicable at the atomic level, which says that every observation changes the thing that is observed, and hence that nothing can be known absolutely. The same is true of the market. If the market knows that a commodity will rise in price, then it acts to counter the rise, even to the extent of producing a glut which will cause the price to fall. We act on the basis of knowledge, and we gain knowledge from our actions, but in acting we change that which we purported to know. At the same time the desire to know inhibits our ability to act, because by entering into any particular set of material circumstances we change those circumstances, and we can never be absolutely certain of how different they may have been if we had not ourselves entered into the situation.

    So among mortal beings the aspiration for omnipotence conflicts with the aspiration for omniscience. We can be neither all-knowing nor all-powerful and we certainly cannot be both.

    The surveillance state will change the material circumstances of our lives. Vast resources will be poured into the project. Hundreds, thousands and even tens of thousands or surveillance staff will be employed. Other sectors of society – health, education, productive enterprise – will be deprived of funding and capable personnel as the surveillance system grows ever-larger. Those who would otherwise have been supporters of the state will begin look at it with suspicion and resentment. In other words, surveillance will itself give rise to the very disaffection which it was intended to detect and suppress.

    The power given by the webmaster’s knowledge of the indiscretions and peccadillos of political and religious leaders will inevitably be used for political ends, whether disclosed publicly or used privately to bring pressure to bear. The effect upon the integrity of the political system will be insidious and corrosive.

    Meanwhile, the lower ranks of the secret watchers who in the end are still human beings, will experience the same frustration as anyone who has knowledge which must be concealed in order to protect its source. Secrets inevitably end in leaks, and in the end, which may not be very long in coming, the surveillance society will suffer the same fate as any other overloaded leaking vessel.

  3. There is a category of secularist thinkers, like myself, who are opposed to the state.
    The state has not always existed, nor need it always exist. A permanent body of armed forces loyal to a ruling class has no meaning or purpose outside of a class society.
    It is possible to imagine a cooperative world with no class divisions and therefore no state, state police or state spy operations.
    In today’s climate of warring nation states, corporations and classes, a peaceful classless world seems remote.
    I still believe such a world is possible and attainable.
    Lacking social tensions over property rights, such a condition would be tolerant of whatever theistic or atheistic beliefs its inhabitants wished to hold.

    • For secularists and believers to peacefully co-exist it is only necessary to agree on a fair disposition of the world’s resources and adherence to the principle of non-violence. Like yourself, I would dispense with professional standing armies and state spy agencies, which will not save the present regime. They will only serve to prolong the agony of its decline and fall. I can live with the secular state, but I do not accept a state (or for that matter a church) which seeks to stand in the place of God. Many secularists would be of like mind, though they would express the concept in a different lexicon.

Comments are closed.