{"id":40423,"date":"2014-03-03T12:00:56","date_gmt":"2014-03-03T12:00:56","guid":{"rendered":"http:\/\/www.transcend.org\/tms\/?p=40423"},"modified":"2015-05-05T22:11:01","modified_gmt":"2015-05-05T21:11:01","slug":"nsa-robots-are-collecting-your-data-too-and-theyre-getting-away-with-it","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2014\/03\/nsa-robots-are-collecting-your-data-too-and-theyre-getting-away-with-it\/","title":{"rendered":"NSA Robots Are &#8216;Collecting&#8217; Your Data, Too, and They&#8217;re Getting Away With It"},"content":{"rendered":"<p><i>Yahoo webcam users are the latest victims of agency eavesdropping \u2013 and whether it\u2019s done by human or algorithm, it\u2019s still eavesdropping.<\/i><\/p>\n<p>\u2022 Revealed: <a href=\"https:\/\/www.transcend.org\/tms\/2014\/03\/uk-optic-nerve-millions-of-yahoo-webcam-images-intercepted-by-gchq\/\" >UK spy agency intercepted Yahoo webcam images<\/a><\/p>\n<div id=\"attachment_40424\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/03\/nsa-spy-robot.jpeg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-40424\" class=\"size-medium wp-image-40424\" alt=\"NSA assisted the UK spy agency GCHQ in collecting millions of images from Yahoo webcams. Photograph: Kai Pfaffenbach \/ Reuters\" src=\"http:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/03\/nsa-spy-robot-300x180.jpeg\" width=\"300\" height=\"180\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/03\/nsa-spy-robot-300x180.jpeg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/03\/nsa-spy-robot.jpeg 460w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-40424\" class=\"wp-caption-text\">NSA assisted the UK spy agency GCHQ in collecting millions of images from Yahoo webcams. Photograph: Kai Pfaffenbach \/ Reuters<\/p><\/div>\n<p>Increasingly, we are watched not by people but by algorithms. Amazon and Netflix track the books we buy and the movies we stream, and suggest other books and movies based on our habits. Google and Facebook watch what we do and what we say, and show us advertisements based on our behavior. Google even modifies our web search results based on our previous behavior. Smartphone navigation apps watch us as we drive, and update suggested route information based on traffic congestion. And the National Security Agency, of course, monitors our phone calls, emails and locations, then uses that information to try to identify terrorists.<\/p>\n<p>Documents provided by Edwards Snowden and revealed by the Guardian today show that the UK spy agency GHCQ, with help from the NSA, <a target=\"_blank\" href=\"http:\/\/www.theguardian.com\/world\/2014\/feb\/27\/gchq-nsa-webcam-images-internet-yahoo\" >has been collecting millions of webcam images from innocent Yahoo users<\/a>. And that speaks to a key distinction in the age of algorithmic surveillance: is it really okay for a computer to monitor you online, and for that data collection and analysis only to count as a potential privacy invasion when a person sees it? I say it\u2019s not, and the latest Snowden leaks only make more clear how important this distinction is.<\/p>\n<p>The robots-vs-spies divide is especially important as we decide what to do about NSA and GCHQ surveillance. The spy community and the Justice Department <a target=\"_blank\" href=\"http:\/\/online.wsj.com\/news\/articles\/SB10001424052702303880604579405640624409748\" >have reported back early<\/a> on President Obama\u2019s request for changing how the NSA \u201ccollects\u201d your data, but the potential reforms &#8211; <a target=\"_blank\" href=\"http:\/\/online.wsj.com\/news\/articles\/SB10001424052702304709904579407321915018810\" >FBI monitoring<\/a>, <a target=\"_blank\" href=\"http:\/\/www.theguardian.com\/world\/2014\/feb\/26\/nsa-reform-white-house-proposal-data-fbi\" >holding on to your phone records<\/a> and more &#8211; still largely depend on what the meaning of \u201ccollects\u201d is.<\/p>\n<p>Indeed, ever since Snowden provided reporters with a trove of top secret documents, we\u2019ve been subjected to all sorts of <a target=\"_blank\" href=\"https:\/\/www.eff.org\/deeplinks\/2013\/06\/director-national-intelligences-word-games-explained-how-government-deceived\" >NSA word games<\/a>. And the word \u201ccollect\u201d has a very special definition, according to the Department of Defense (DoD). <a target=\"_blank\" href=\"http:\/\/www.fas.org\/irp\/doddir\/dod\/d5240_1_r.pdf\" >A 1982 procedures manual<\/a> (pdf; page 15) says: \u201cinformation shall be considered as \u2018collected\u2019 only when it has been received for use by an employee of a DoD intelligence component in the course of his official duties.\u201d And \u201cdata acquired by electronic means is \u2018collected\u2019 only when it has been processed into intelligible form\u201d.<\/p>\n<p>Director of National Intelligence James Clapper <a target=\"_blank\" href=\"http:\/\/www.nbcumv.com\/mediavillage\/networks\/nbcnews\/pressreleases?pr=contents\/press-releases\/2013\/06\/09\/nbcnewsexclusiv1370799482417.xml\" >likened the NSA\u2019s accumulation of data to a library<\/a>. All those books are stored on the shelves, but very few are actually read. \u201cSo the task for us in the interest of preserving security and preserving civil liberties and privacy,\u201d says Clapper, \u201cis to be as precise as we possibly can be when we go in that library and look for the books that we need to open up and actually read.\u201d Only when an individual book is read does it count as \u201ccollection\u201d, in government parlance.<\/p>\n<p>So, think of that friend of yours who has thousands of books in his house. According to the NSA, he\u2019s not actually \u201ccollecting\u201d books. He\u2019s doing something else with them, and the only books he can claim to have \u201ccollected\u201d are the ones he\u2019s actually read.<\/p>\n<p>This is why Clapper claims \u2013 <a target=\"_blank\" href=\"http:\/\/www.theguardian.com\/world\/2013\/jul\/02\/james-clapper-senate-erroneous\" >to this day<\/a> \u2013 that he didn\u2019t lie in a Senate hearing when <a target=\"_blank\" href=\"http:\/\/nymag.com\/daily\/intelligencer\/2013\/06\/wyden-clapper-nsa-video-congress-spying.html\" >he replied<\/a> \u201cno\u201d to this question: \u201cDoes the NSA collect any type of data at all on millions or hundreds of millions of Americans?\u201d<\/p>\n<p>If the NSA collects &#8211; I\u2019m using the everyday definition of the word here \u2013 all of the contents of everyone\u2019s e-mail, it doesn\u2019t count it as being collected in NSA terms until someone reads it. And if it collects \u2013 I\u2019m sorry, but that\u2019s really the correct word &#8211; everyone\u2019s phone records or location information and stores it in an enormous database, that doesn\u2019t count as being collected \u2013 NSA definition \u2013 until someone looks at it. If the agency uses computers to search those emails for keywords, or correlates that location information for relationships between people, it doesn\u2019t count as collection, either. Only when those computers spit out a particular person has the data \u2013 in NSA terms \u2013 actually been collected.<\/p>\n<p>If the modern spy dictionary has you confused, maybe dogs can help us understand why this legal workaround, by big tech companies and the government alike, is still a serious invasion of privacy.<\/p>\n<p>Back when Gmail was introduced, this was Google\u2019s defense, too, about its context-sensitive advertising. Googles computers examine each individual email and insert an advertisement nearby, related to the contents of your email. But no person at Google reads any Gmail messages; only a computer does. In the words of one Google executive: \u201cWorrying about a computer reading your email is like worrying about your dog seeing you naked\u201d.<\/p>\n<p>But now that we have an example of a spy agency seeing people naked \u2013 there are a surprising number of sexually explicit images <a target=\"_blank\" href=\"http:\/\/www.theguardian.com\/world\/2014\/feb\/27\/gchq-nsa-webcam-images-internet-yahoo\" >in the newly revealed Yahoo image collection<\/a> \u2013 we can more viscerally understand the difference.<\/p>\n<p>To wit: when you\u2019re watched by a dog, you know that what you\u2019re doing will go no further than the dog. The dog can\u2019t remember the details of what you\u2019ve done. The dog can\u2019t tell anyone else. When you\u2019re watched by a computer, that\u2019s not true. You might be told that the computer isn\u2019t saving a copy of the video, but you have no assurance that that\u2019s true. You might be told that the computer won\u2019t alert a person if it perceives something of interest, but you can\u2019t know if that\u2019s true. You do know that the computer is making decisions based on what it receives, and you have no way of confirming that no human being will access that decision.<\/p>\n<p>When a computer stores your data, there\u2019s always a risk of exposure. There\u2019s the risk of accidental exposure, when some hacker or criminal breaks in and steals the data. There\u2019s the risk of purposeful exposure, when the organization that has your data uses it in some manner. And there\u2019s the risk that another organization will demand access to the data. The FBI can serve a National Security Letter on Google, demanding details on your email and browsing habits. There isn\u2019t a court order in the world that can get that information out of your dog.<\/p>\n<p>Of course, any time we\u2019re judged by algorithms, there\u2019s the potential for false positives. You are already familiar with this; just think of all the irrelevant advertisements you\u2019ve been shown on the Internet, based on some algorithm misinterpreting your interests. In advertising, that\u2019s okay. It\u2019s <a target=\"_blank\" href=\"http:\/\/www.mediapost.com\/publications\/article\/206045\/no-more-patience-with-irrelevant-ads.html\" >annoying<\/a>, but there\u2019s little actual harm, and you were busy reading your email anyway, right? But that harm increases as the accompanying judgments become more important: our credit ratings depend on algorithms; how were treated at airport security does, too. And most alarming of all, drone targeting is <a target=\"_blank\" href=\"https:\/\/www.schneier.com\/essay-470.html\" >partly based<\/a> on algorithmic surveillance.<\/p>\n<p>The primary difference between a computer and a dog is that the computer interacts with other people in the real world, and the dog does not. If someone could isolate the computer in the same way a dog is isolated, we wouldn\u2019t have any reason to worry about algorithms crawling around in our data. But we can\u2019t. Computer algorithms are intimately tied to people. And when we think of computer algorithms surveilling us or analyzing our personal data, we need to think about the people behind those algorithms. Whether or not anyone actually looks at our data, the very fact that they even could is what makes it surveillance.<\/p>\n<p>This is why Yahoo called GCHQ\u2019s webcam-image collection \u201c<a target=\"_blank\" href=\"http:\/\/www.theguardian.com\/world\/2014\/feb\/27\/gchq-nsa-webcam-images-internet-yahoo\" >a whole new level of violation of our users\u2019 privacy<\/a>\u201d. This is why we\u2019re not mollified by attempts from the UK equivalent of the NSA to apply facial recognition algorithms to the data, or to limit how many people viewed the sexually explicit images. This is why Google\u2019s eavesdropping is different than a dog\u2019s eavesdropping, and why the NSA\u2019s definition of \u201ccollect\u201d makes no sense whatsoever.<\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.theguardian.com\/commentisfree\/2014\/feb\/27\/nsa-robots-algorithm-surveillance-bruce-schneier?CMP=ema_565\" >Go to Original \u2013 theguardian.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Yahoo webcam users are the latest victims of agency eavesdropping \u2013 and whether it\u2019s done by human or algorithm, it\u2019s still eavesdropping.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-40423","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/40423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=40423"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/40423\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=40423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=40423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=40423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}