Sunteți pe pagina 1din 7

PART TWO

SURVEILLANCE

NATION
In the name of convenience, efficiency, and security,
we’re creating a world in which our
every movement, transaction, and indiscretion
can be electronically tracked.But if we ensure that
emerging surveillance technologies
are designed in ways that deter misuse, we may not
have to forfeit our privacy in the bargain.

By Dan Farmer and Charles C.Mann


I L LU S T R AT I O N S B Y B R I A N S TAU F F E R
46 TECHNOLOGY REVIEW May 2003 w w w. t e c h n o l o g y r e v i e w. c o m
“Give me Duquesne minus 7, for a nickel.”
It was February 1965 on a lonely sec- have a “reasonable expectation of pri- In the past, government agencies and
tion of Los Angeles’s Sunset Boulevard, vacy”—a phrase that even now, four businesses have been blamed for the
and Charles Katz, one of life’s little losers, decades later, resonates in the labora- deployment of surveillance technology—
was placing an illegal sports bet over a tory of Wayne Wolf. An electrical engi- and not without reason. In a single three-
public telephone. Unbeknownst to Katz, neer at Princeton University, Wolf leads week period earlier this year, the Bush
however, the FBI had placed a micro- a research team that is creating a tiny, administration announced that it was
phone atop the telephone booth to record inexpensive video camera one might building a system that pools real-time
this small-time gambler’s conversations. glibly describe as a lens glued to a chip. traffic data from Internet service
Engineers often mock the law for In theory, the camera could be the size of providers and monitors threats to the
lagging behind technology. In fact, the a postage stamp and cost as little as $10, global information network; inaugurated
law is often far ahead of it. This time it “small and cheap enough to scatter by the the Terrorist Threat Integration Center, a
was ahead by nearly 200 years, for after dozen,” as Wolf puts it. The laws of optics vast data bank that will combine domes-
Katz’s arrest his lawyers argued that dictate that tiny lenses make low-reso- tic and foreign intelligence on U.S. citi-
although the framers of the Constitution lution images, so the researchers are zens and foreign visitors; and opened up
could not possibly have encountered developing software that melds video the State Department’s database of 50
tape recorders and telephone booths, from multiple cameras located in a single million visa applications to U.S. police
the Fourth Amendment’s ban on “unrea- area, producing sharp, real-time images departments. Meanwhile the mayor of
sonable” searches nonetheless covered of the entire space. “You could stick them London, England, launched a traffic con-
them. Because the FBI had no search up all over a building and know exactly trol program that records the license
warrant, Katz’s lawyers said, bugging the what was going on inside,” Wolf says. “A plates of every vehicle entering the city
phone booth was illegal. In a landmark lot of people would find a use for that.” center—and furnishes the information to
decision, the Supreme Court agreed, These networks of tiny cameras— intelligence agencies.
affirming for the first time that elec- and the host of other surveillance tech- Such plans have met with scant citi-
tronic surveillance was—constitution- nologies that are now being unveiled—are zen resistance—understandable, perhaps,
ally speaking—a search. “No less than an both tributes to innovation and, as Wolf given that these same citizens are
individual in a business office, in a acknowledges, potential menaces to per- installing nanny- and pet-watching cam-
friend’s apartment, or in a taxicab,” the sonal privacy. Indeed, the new marriage eras, flocking to automated highway-toll
majority declared, “a person in a tele- of ever smaller lenses and sensors, ever collection systems (which reduce lines
phone booth may rely upon the protec- larger databases, and ever faster com- as they record every car that passes
tion of the Fourth Amendment.” puters is making surveillance so cheap through their gates), and scoping out
Equally important was Justice John and commonplace that it is on the way to prospective dates, friends, and employees
Harlan’s concurring opinion. The gov- creating a state of nearly universal sur- using such Internet search engines as
ernment, he argued, could not freely veillance (see “Surveillance Nation—Part Google. Between 2000 and 2005, accord-
eavesdrop in any place where people One,” TR April 2003). ing to market research firm Frost and

A Smart Way to Protect Privacy


As this conceptual illustration shows, personal data on Malaysia’s smart card chips—designed to
replace driver’s licenses—are stored in isolated files, each accessible only to authorized readers.

IDENTIFICATION
ID number, PIN, address, photograph, birth date,
AT A BAR
and digitized thumbprint.
Bartender can check date
of birth without seeing
patron’s name or address.

DRIVER’S LICENSE
License number, AT A TRAFFIC STOP
expiration date, Police can check name
E-CASH
license class, driver’s and date of birth. If PIN or
Encrypted code for
record of violations. thumbprint is provided,
electronic account-
balance verification. other data are unlocked.

PASSPORT AT A TICKET COUNTER


HEALTH Passport serial Agent can check passport
Medical history, drug number and number; during periods of
allergies, and blood type. expiration date. high alert, traveler’s
thumbprint is required.

48 TECHNOLOGY REVIEW May 2003 w w w. t e c h n o l o g y r e v i e w. c o m


Watching What You Do
TECHNOLOGY DESCRIPTION SELECTED PROVIDERS

AT HOME

“Nanny cams” Small, easily hidden wireless digital video cameras for monitoring Nanny Check, Plainview, NY
children and pets. Know Your Nanny, North Brunswick, NJ
Infrared Technology that alerts police to such suspicious thermal activity Monroe Infrared Technology, Kennebunk, ME
surveillance inside houses as the heat from marijuana-growing equipment. Sierra Pacific, Las Vegas, NV
ON THE ROAD

Traffic cameras Web cameras mounted at high-traffic points; specialized cameras Axis Communications, Lund, Sweden
that read plate numbers for law enforcement. Computer Recognition Systems, Cambridge, MA
Automobile Electronic toll deduction when users pass through tollgates; Mark IV Industries, Sölvesborg, Sweden
transponders supported by laser vehicle measurement and axle number detection. SAMSys Technologies, Richmond Hill, Ontario
Cell phones Technology that reports a cell phone user’s precise location to Mandatory for all U.S. wireless carriers and cell
authorities during 911 calls. phone manufacturers by 2006
AT WORK

Internet and Text and data filters that ensure compliance with privacy and Tumbleweed Communications, Redwood City, CA
e-mail monitoring harassment laws and corporate confidentiality requirements. Clearswift,Theale, UK
Keystroke logging, Systems that record everything typed into a computer, including Amecisco, San Francisco, CA
file usage review e-mail, instant messages, and Web addresses. NetHunter Group,Tallinn, Estonia
AT SCHOOL

Web filtering Software that prevents students from reaching inappropriate Web N2H2, Seattle,WA
content. iTech, Racine,WI
Locator Bracelets that combine GPS and digital cell-phone signals to locate Wherify Wireless, Redwood Shores, CA
wristbands wearer within 30 meters. Peace of Mind at Light Speed,Westport, CT
AT THE STORE

Smart cards Microchips embedded in plastic cards that carry e-cash, along with Gemplus, Luxembourg
driver’s license, age and address information, and medical records. Oberthur Card Systems, Paris, France
Supermarket Cards—with embedded chips or standard magnetic stripe—that Catalina Marketing, St. Petersburg, FL
discount cards earn member discounts and track shopping habits. SchlumbergerSema, New York, NY

Sullivan, sales of digital video surveil- figured may help foster accountability in the accelerator, the BaBar database, as it
lance cameras will increase by a factor of and usage policies that could regulate is known, contains more than 680 tera-
10. More and more of these cameras are the deployment of surveillance. Whether bytes of information—equivalent to a
being purchased by private associations, these tools are actually used, though, stack of copies of the Bill of Rights some
small businesses, and—most startling— will depend on what citizens want and 21,000 kilometers high. (A terabyte is 1012
consumers. CCS International, a sur- believe. In the United States, the rise of bytes.) From a data-gathering viewpoint,
veillance products company in New ubiquitous surveillance will be governed the Stanford experiment is a nightmare.
Rochelle, NY, estimates that ordinary largely by the answer to the question The accelerator smashes electrons and
Americans are buying surveillance first raised in the long-ago case of Charles positrons into each other at almost the
devices, many of dubious legality, at a clip Katz: What is a “reasonable expectation speed of light, creating an explosion of data
of $6 million a day. We have met the of privacy,” anyway? in a few trillionths of a second—vastly
enemy of our privacy, and it is us. more input than any computer network
Although this technology is growing can handle. To make sense of these over-
much faster than is generally recognized, TAMING THE DATA TSUNAMI whelming infobursts, BaBar engineers

O
its advance is neither inexorable nor ne of the claimants to the title of have developed a variety of techniques
uncontrollable. It will be constrained by the world’s largest database sits on for containing the flow of data. These
the structure of the huge databases neces- the edge of the Stanford University techniques will almost certainly be used by
sary to store and manipulate surveil- campus, connected to a three-kilometer- the enormous surveillance archives of
lance data—and by the cultural and legal long particle accelerator. Housing records tomorrow, suggesting both how they will
environment in which those databases of the millions upon millions of function and how—just possibly—they
arise. In fact, the way databases are con- elementary-particle interactions that occur might be regulated for the public good.

w w w. t e c h n o l o g y r e v i e w. c o m TECHNOLOGY REVIEW May 2003 49


Rather than trying to absorb the benign purpose being used for another, vehicle owners receive summonses in
entire river of readings from the particle perhaps sinister, end. “Time and time the mail. Just before the program’s
collisions, the sensors in the BaBar particle again, people have misused this kind of launch, newspapers revealed that the
detector record just a few specific aspects data,” says Peter G. Neumann, a com- images would be given to police and
of selected events, discarding millions of puter scientist at SRI, a nonprofit research military databases, which will use face
data points for every one kept. That small organization in Menlo Park, CA. To dis- recognition software to scan for criminals
sip of raw data—about a gigabyte every cover when users have overstepped or and terrorists—an example of what pri-
few minutes of running time—is still too abused their privileges, he says, “account- vacy activists decry as “feature creep.”
much for physicists to study, says Jacek ability as to who is accessing what, alter- Observes Marc Rotenberg, executive
Becla, the lead designer of the database. To ing what data, not updating stuff that director of the Electronic Privacy Infor-
further distill the observations, the detec- should have been corrected, et cetera, is mation Center in Washington, DC, “They
tor’s software intensively “preprocesses” absolutely vital.” say they’re taking your picture to stop
the selected measurements, reducing each Such monitoring is already standard traffic jams. Then all of a sudden they’re
to a relative handful of carefully checked, operating procedure in many large data- trying to find out if you’re a terrorist.”
easily manipulable numbers before incor- bases. SETI@home, for instance, tracks As all this suggests, repurposing sur-
porating them into the database. exactly which of its millions of member veillance information is subject to so
Even after preprocessing, a data set computers is examining which datum— many pitfalls that “we need to build
can still be too big to examine efficiently not least because the system, according to restrictions on the way data are used,” says
in a single central locality. As a result, Berkeley computer scientist David Lawrence Lessig, a Stanford University
large databases often divide their work Anderson, its designer, sends dummy law professor who is the author of Code
into smaller pieces and distribute the data to users during the 10 to 15 percent and Other Laws of Cyberspace. Ideally, in
resulting tasks among hundreds or thou- of the time it is down, and therefore Lessig’s view, “you’d want to have a situa-
sands of machines around a network.
Many of these techniques were first
implemented on a large scale by
“IF THE POLICE CAN TRACK US AS WE GO ABOUT OUR
SETI@Home, a massively distributed DAILY ROUTINE, WE NEED TO BE ABLE TO SEE THE
system that hunts for alien civilizations.
SETI@Home takes in radio telescope
POLICE AS THEY GO ABOUT THEIRS. EQUAL ACCESS
readings, breaks the data into chunks, WOULD MAKE THEM A LOT MORE CAREFUL.”
and uses the Internet to dole them out to
the home computers of more than four needs to monitor what is real. Nonethe- tion like what goes on with credit
million volunteers. When these com- less, Neumann says, most commercial reports—we can see them, and know
puters are otherwise idle, they run a database programs don’t securely record something about who is using them and
screensaver-like program that probes the the usage data they collect. With off- why, and potentially remove any errors.”
data for signs of sentient life. the-shelf database software from Oracle, The technology to provide such pro-
As the extraordinary measures taken IBM, and Microsoft, he says, “there is no tections is already emerging. The
by BaBar and SETI@Home suggest, large way” that such large surveillance data- Malaysian government is rolling out a
databases face inherent problems. Simply bases as the Terrorist Threat Integration multifunction smart card with 32 kilo-
running the routine comparisons that Center “could get accountability in any bytes of memory that can store up to
are intrinsic to databases takes much meaningful sense.” The software simply seven types of data, including details
longer as data become more complex, allows for too many “trusted users”— about a person’s identity, driver’s license,
says Piotr Indyk, a database researcher at people who have full access to the system bank account, and immigration status.
MIT. Worse, he says, the results are often and can modify audit trails, thus deleting Embedded software encrypts and com-
useless: as the data pool swells, the num- their tracks from the logs. The possi- partmentalizes the information and keys
ber of chance correlations rises even bility of meaningful accountability does it to the cardholder’s biometric data,
faster, flooding meaningful answers in a exist—but people must demand it. ensuring that when an authorized gov-
tsunami of logically valid but utterly use- Similar logic applies to the fear that ernment or business official accesses one
less solutions. Without preprocessing and data collected for one purpose will be type of data, the other types remain off-
distributed computing, the surveillance misused for another. Consider, for limits (see “A Smart Way to Protect Pri-
databases of tomorrow will drown in example, the program in London, En- vacy,” p. 48). If introduced into the United
their own input. gland, that levies a £5 ($8) “congestion States, such cards could be set to tell bar-
It is, perhaps, unexpected that both charge” on each vehicle crossing into tenders that their bearers “are over 21
preprocessing and distributed computing the central city. To enforce collection, and can drink alcohol; but that’s all,”
also exemplify ways the structure of data- the city uses hundreds of digital video explains Lessig. “And if a police officer
bases might provide levers to control cameras and character recognition soft- stops you, the card should only tell her
their use—if people want them. For pri- ware to read the license plate of every that you have a valid driver’s license”—
vacy advocates, surveillance raises two vehicle crossing into the fee area. Plate and not, say, your Social Security number.
critical issues: lack of accountability and numbers are matched against the list of The same kinds of access controls
the specter of information collected for a drivers who have paid up; noncompliant should be applied to large, centralized

50 TECHNOLOGY REVIEW May 2003 w w w. t e c h n o l o g y r e v i e w. c o m


databases, Lessig believes. Users logging other words, even if original surveillance large databases is a powerful argument for
onto a sensitive database should have to data are correctly observed and entered— the accountability measures that would
identify themselves, and their access far from a foregone conclusion—the mitigate their impact on privacy.
should be restricted solely to data they are deductions made by databases using such Stringent monitoring of database
authorized to examine. To further deter information must be treated with care. usage and public access to those records
misuse, the database should preserve a Without safeguards, the security prob- constitute what might be dubbed the
record of its users and their actions. Such lems of large surveillance databases could Golden Rule of Surveillance.“If the police
precautions are not only technically fea- quickly get out of hand. “It’s like Willie can track us as we go about our daily rou-
sible but, to Lessig’s way of thinking, Sutton,” says Herbert Edelstein, president tine, we need to be able to see the police as
simply good policy. Still, he sees “next to of Two Crows, a database consulting firm they go about theirs,” says Carl S. Kaplan,
no chance” that such precautions will be in Potomac, MD. “He said he broke into a New York City appellate lawyer and for-
implemented, because terrorist attacks banks because that’s where the money mer New York Times columnist on Inter-
have changed the government’s attitude was. Well, identity thieves will try to break net law. (Kaplan conducted TR’s Point of
toward privacy and because ordinary into large databases of personal informa- Impact interview in this issue. See “Curbing
people have demonstrated their willing- tion because that’s where the identity data Peer-to-Peer Piracy,” p. 70.) In his view, sur-
ness to embrace the technology without are.” For similar reasons, any government veillance databases will be less prone to
understanding the consequences. database compiled for hunting criminals misuse if the same rules apply to everyone.
and terrorists will be irresistibly attractive “It’s a fact of life that some police officers
to its own targets. lie,” he says. “Equal access would either
THE GOLDEN RULE OF SURVEILLANCE Unfortunately, computers are noto- make it a lot harder for them to lie or

J
ust hours after the first bombs fell on riously hard to secure, and this difficulty make them a lot more careful about what
Afghanistan in October 2001, the Ara- increases as they grow more numerous, surveillance they use.”
bic television network Al-Jazeera complex, and heavily used. People were
broadcast a grainy videotape that showed sharply reminded of this vulnerability
Osama bin Laden reveling in the destruc- on January 25, when the Slammer worm THE ELECTRONIC PANOPTICON

I
tion of the World Trade Center. Partly hit the Internet. (A worm is a malicious n 1791 the British philosopher Jeremy
because of the timing of the tape’s release, computer program that hijacks one com- Bentham envisioned a “panopticon,” a
the Internet was quickly filled with spec- puter after another, forcing each com- domelike prison where guards could
ulations that the tape and others that fol- promised machine to send out more observe all the inmates at all times from
lowed were counterfeited by bin Laden’s identical worms.) Within 10 minutes of within a central observation tower.
confederates or the U.S. government. After
all, video is easy to fake, isn’t it?
Nonsense, says Steve Sullivan, R&D
LEGISLATURES COULD DEMAND THAT ORGANIZA-
director for Industrial Light and Magic, TIONS KEEP DETAILED PUBLICLY AVAILABLE RECORDS
the well-known digital-effects company.
Such spoofing, he says, “is simply not
OF HOW THEIR DATABASES ARE USED.BUT THAT WILL
possible with any techniques I’m aware NOT HAPPEN WITHOUT A SHIFT IN PUBLIC OPINION.
of.” Even for modest video quality, today’s
computational power and rendering skills its appearance, Slammer had infected Bentham never managed to convince the
fall far short of what would be required to some 75,000 computers, many of them Crown to build his prison, but its prin-
model a human realistically enough to critically important to business. Alas, ciples were embraced across the Atlantic,
fool viewers. “You could hire an actor to Slammer was not unique: almost every in Philadelphia’s Eastern State Peniten-
impersonate [bin Laden], I suppose,” major site—from the New York Times to tiary. Built in 1829, this radical building
Sullivan says. “Basically, though, when the CIA and FBI—has been cracked at became a global sensation—the most
you see surveillance video, it’s real.” one time or another. On the basis of a influential prison ever built, according to
Nonetheless, the impulse toward sus- General Accounting Office analysis last Max Page, an architectural historian at the
picion is fundamentally correct. Video year, Congressman Stephen Horn (R- University of Massachusetts, Amherst.
may not yet be easily spoofed, but most CA) issued failing grades to 14 of the 24 In the Philadelphia panopticon, pris-
other forms of digital data—spreadsheets, major federal agencies on his annual oners lived in solitary confinement in
documents, and records of all types—are “computer security report card” for Uncle seven cellblocks that radiated like the
easy to alter subtly. “Sheer size and com- Sam. Given such dismal statistics, opera- spokes of a wheel from an observation
plexity are your enemy,” says Bruce tors of government, corporate, and other room. The inmates could see neither the
Schneier, chief technical officer for Coun- databases must assume their networks guards watching them nor the other pris-
terpane Internet Security, in Cupertino, will be periodically compromised, and oners around them; their only window
CA. “The vast majority of data stored or they should plan accordingly. was a skylight. Living in isolation under
used by computers are never seen by Yet this inescapable lack of trust- the scrutiny of invisible authorities,
people. Answers are assumed to be cor- worthiness—perhaps surprisingly—is inmates were supposed to reflect on their
rect, but the integrity of every part of the not all bad. Indeed, the very need to be sins and become penitent: Eastern State
system is nearly impossible to verify.” In constantly suspicious of the integrity of was the world’s first “penitentiary.”

52 TECHNOLOGY REVIEW May 2003 w w w. t e c h n o l o g y r e v i e w. c o m


doing, they’ll take a sick day instead.” If
people aren’t comfortable with a surveil-
lance regime, Botan argues, they subvert
it, exacerbating the problem surveillance
was supposed to ameliorate.
Panoptic effects take hold in the
larger society as surveillance spreads,
says Jeffrey Smith, a lawyer at Arnold
and Porter in Washington, DC, who was
general counsel to the Central Intelli-
gence Agency. “The notion of what is
private and what the limits of privacy are
clearly changes to reflect technology,”
he says. “If what was once thought of as
public data can be used to construct
what might be an intrusively detailed
picture of your life, people will push
back. The courts will visit this issue.
There will be legislation too.”
Much as last year’s accounting scan-
dals led Congress to push for corporate
reforms, legislatures could demand that
organizations that maintain databases
of personal information keep detailed
publicly available records of their use. But
that will not happen without a shift in
public opinion. “A lot of law turns on
‘reasonable expectation of privacy,’” says
Paul Schwartz, a privacy law specialist at
Brooklyn Law School. “But as technology
becomes cheaper and surveillance
spreads everywhere, the danger is that the
reasonable expectation of privacy will
change.” If Americans grow accustomed
to a lack of privacy, in other words, they
will get exactly what they expect.
“This technology could do a lot of
good and a lot of harm,” says Shari
After Eastern State was unveiled, gov- counter the purpose of monitoring. Pfleeger, a computer scientist and senior
ernments around the world built more According to the American Management researcher at the RAND think tank in
than 300 panopticon prisons. But they Association, nearly 80 percent of major Washington, DC. “But to get the balance
gradually fell out of use, partly because U.S. companies electronically monitor right, it needs to be actively talked
neither wardens nor inmates could bear their employees. Common observational about.” More often than is commonly
playing their roles. According to Dutch methods include logging telephone calls realized, such public discussion—
architect Rem Koolhaas’s study of panop- and e-mail to determine which employees nudged along by legal action and on-
ticons, prisoners found ways to avoid sur- are wasting time and periodically record- going public-awareness campaigns—has
veillance; guards, disheartened by the lack ing what is on workers’ computer screens transformed prevailing notions of
of interaction, left the center. Ultimately, to inhibit porn perusing. Such innova- acceptable behavior. Examples include
inmates and guards found themselves tions, Botan says, do help employers the dramatic turnabouts over the past
continuously watching each other, trans- encourage efficiency and avoid “hostile two decades in attitudes toward smoking
forming the prison, in Koolhaas’s phrase, environment” litigation. But there are and drunk driving, both of which were
into “a transparent space” where “no other, unintended results. “Employees driven in part by grass-roots activism.
action or inaction remains unnoticed.” who know everything is being logged,” he The rapidity of the advances in surveil-
Similarly, omnipresent electronic sur- says, “are less willing to exchange infor- lance technology, unfortunately, means
veillance leads to what Carl Botan, a mation with other employees—the hori- that society has much less time to con-
researcher at Purdue University’s Center zontal communication that is the front the trade-offs between security
for Education and Research in Informa- problem-solving communication in the and privacy. The moment for debate
tion Assurance and Security, calls panop- workplace. Not wanting to be recorded and conversation is now, while the tech-
tic effects—unexpected reactions that calling home to monitor how a sick kid is nology is still in its adolescence. ◊

w w w. t e c h n o l o g y r e v i e w. c o m TECHNOLOGY REVIEW May 2003 53

S-ar putea să vă placă și