{"id":98661,"date":"2017-09-18T12:00:31","date_gmt":"2017-09-18T11:00:31","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=98661"},"modified":"2017-09-16T19:15:16","modified_gmt":"2017-09-16T18:15:16","slug":"chelsea-manning-the-dystopia-we-signed-up-for","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2017\/09\/chelsea-manning-the-dystopia-we-signed-up-for\/","title":{"rendered":"Chelsea Manning: The Dystopia We Signed Up For"},"content":{"rendered":"<div id=\"attachment_98662\" style=\"width: 510px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/09\/surveillance-big-brother-spy.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-98662\" class=\"wp-image-98662\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/09\/surveillance-big-brother-spy.jpg\" alt=\"\" width=\"500\" height=\"333\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/09\/surveillance-big-brother-spy.jpg 768w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/09\/surveillance-big-brother-spy-300x200.jpg 300w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><p id=\"caption-attachment-98662\" class=\"wp-caption-text\">Threats of physical violence and terrorism have led governments to cut through traditional barriers of personal privacy in the name of national security. An employee of the Underground at Victoria Station in London monitors surveillance cameras. Credit Andrew Testa for The New York Times<\/p><\/div>\n<p><em>13 Sep 2017 &#8211; <\/em>For seven years, I didn\u2019t exist.<\/p>\n<p>While incarcerated, I had no bank statements, no bills, no credit history. In our interconnected world of big data, I appeared to be no different than a deceased person. After I was released, that lack of information about me created a host of problems, from difficulty accessing bank accounts to trouble getting a driver\u2019s license and renting an apartment.<\/p>\n<p>In 2010, the iPhone was only three years old, and many people still didn\u2019t see smartphones as the indispensable digital appendages they are today. Seven years later, virtually everything we do causes us to bleed digital information, putting us at the mercy of invisible algorithms that threaten to consume our freedom.<\/p>\n<p>Information leakage can seem innocuous in some respects. After all, why worry when we have nothing to hide?<\/p>\n<p>We file our taxes. We make phone calls. We send emails. Tax records are used to keep us honest. We agree to broadcast our location so we can check the weather on our smartphones. Records of our calls, texts and physical movements are filed away alongside our billing information. Perhaps that data is analyzed more covertly to make sure that we\u2019re not terrorists \u2014 but only in the interest of national security, we\u2019re assured.<\/p>\n<p>Our faces and voices are recorded by surveillance cameras and other internet-connected sensors, some of which we now willingly put inside our homes. Every time we load a news article or page on a social media site, we expose ourselves to tracking code, allowing hundreds of unknown entities to monitor our shopping and online browsing habits. We agree to cryptic terms-of-service agreements that obscure the true nature and scope of these transactions.<\/p>\n<div id=\"attachment_98663\" style=\"width: 510px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/09\/surveillance-big-brother-spy-biometric.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-98663\" class=\"wp-image-98663\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/09\/surveillance-big-brother-spy-biometric.jpg\" alt=\"\" width=\"500\" height=\"333\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/09\/surveillance-big-brother-spy-biometric.jpg 675w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/09\/surveillance-big-brother-spy-biometric-300x200.jpg 300w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><p id=\"caption-attachment-98663\" class=\"wp-caption-text\">Biometric information such as fingerprints, retinal scans and DNA helps governments and corporations track people around the world. In Iraq, United States Army soldiers scan a man\u2019s eye to see whether he is a known insurgent.<br \/> Credit Michael Kamber for The New York Times<\/p><\/div>\n<p>According to a 2015 <a target=\"_blank\" href=\"http:\/\/www.pewresearch.org\/fact-tank\/2015\/01\/16\/privacy\/\" >study<\/a> from the Pew Research Center, 91 percent of American adults believe they\u2019ve lost control over how their personal information is collected and used.<\/p>\n<p>Just how much they\u2019ve lost, however, is more than they likely suspect.<\/p>\n<p>The real power of mass data collection lies in the hand-tailored algorithms capable of sifting, sorting and identifying patterns within the data itself. When enough information is collected over time, governments and corporations can use or abuse those patterns to predict future human behavior. Our data establishes a \u201c<a target=\"_blank\" href=\"https:\/\/www.theguardian.com\/world\/2013\/sep\/30\/nsa-americans-metadata-year-documents\" >pattern of life<\/a>\u201d from seemingly harmless digital residue like cellphone tower pings, credit card transactions and web browsing histories.<\/p>\n<p>The consequences of our being subjected to constant algorithmic scrutiny are often unclear. For instance, <a target=\"_blank\" href=\"https:\/\/www.nytimes.com\/topic\/subject\/artificial-intelligence\" >artificial intelligence<\/a> \u2014 Silicon Valley\u2019s catchall term for deepthinking and deep-learning algorithms \u2014 is touted by tech companies as a path to the high-tech conveniences of the so-called internet of things. This includes digital home assistants, connected appliances and self-driving cars.<\/p>\n<p>Simultaneously, algorithms are already analyzing social media habits, determining creditworthiness, deciding which job candidates get called in for an interview and judging whether criminal defendants should be <a target=\"_blank\" href=\"https:\/\/www.nytimes.com\/2017\/02\/06\/nyregion\/new-jersey-bail-system.html\" >released on bail<\/a>. Other machine-learning systems use automated facial analysis to detect and track emotions, or claim the ability to predict whether someone will become a criminal based only on their <a target=\"_blank\" href=\"https:\/\/medium.com\/backchannel\/put-away-your-machine-learning-hammer-criminality-is-not-a-nail-1309c84bb899\" >facial features<\/a>.<\/p>\n<p>These systems leave no room for humanity, yet they define our daily lives. When I began rebuilding my life this summer, I painfully discovered that they have no time for people who have fallen off the grid \u2014 such nuance eludes them. I came out publicly as transgender and began hormone replacement therapy while in prison. When I was released, however, there was no quantifiable history of me existing as a transwoman. Credit and background checks automatically assumed I was committing fraud. My bank accounts were still under my old name, which legally no longer existed. For months I had to carry around a large folder containing my old ID and a copy of the court order declaring my name change. Even then, human clerks and bank tellers would sometimes see the discrepancy, shrug and say \u201cthe computer says no\u201d while denying me access to my accounts.<\/p>\n<p>Such programmatic, machine-driven thinking has become especially dangerous in the hands of governments and the police.<\/p>\n<p>In recent years our military, law enforcement and intelligence agencies have merged in unexpected ways. They harvest more data than they can possibly manage, and wade through the quantifiable world side by side in vast, usually windowless buildings called <a target=\"_blank\" href=\"https:\/\/www.dhs.gov\/state-and-major-urban-area-fusion-centers\" >fusion centers<\/a>.<\/p>\n<p>Such powerful new relationships have created a foundation for, and have breathed life into, a vast police and surveillance state. Advanced algorithms have made this possible on an unprecedented level. Relatively minor infractions, or \u201cmicrocrimes,\u201d can now be policed aggressively. And with national databases shared among governments and corporations, these minor incidents can follow you forever, even if the information is incorrect or lacking context.<\/p>\n<p>At the same time, the United States military uses the metadata of countless communications for <a target=\"_blank\" href=\"https:\/\/www.nytimes.com\/2015\/06\/25\/world\/middleeast\/us-drone-strike-said-to-kill-doctor-trying-to-implant-bombs.html\" >drone attacks<\/a>, using pings emitted from cellphones to track and eliminate targets.<\/p>\n<p>In literature and pop culture, concepts such as \u201cthoughtcrime\u201d and \u201cprecrime\u201d have emerged out of dystopian fiction. They are used to restrict and punish anyone who is flagged by automated systems as a potential criminal or threat, even if a crime has yet to be committed. But this science fiction trope is quickly becoming reality. Predictive policing algorithms are already being used to create automated heat maps of future crimes, and like the \u201cmanual\u201d policing that came before them, they overwhelmingly <a target=\"_blank\" href=\"https:\/\/www.propublica.org\/article\/machine-bias-risk-assessments-in-criminal-sentencing\" >target poor and minority neighborhoods<\/a>.<\/p>\n<p>The world has become like an eerily banal dystopian novel. Things look the same on the surface, but they are not. With no apparent boundaries on how algorithms can use and abuse the data that\u2019s being collected about us, the potential for it to control our lives is ever-growing.<\/p>\n<p>Our drivers\u2019 licenses, our keys, our debit and credit cards are all important parts of our lives. Even our social media accounts could soon become crucial components of being fully functional members of society. Now that we live in this world, we must figure out how to maintain our connection with society without surrendering to automated processes that we can neither see nor control.<\/p>\n<p>______________________________________________<\/p>\n<p style=\"padding-left: 30px;\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/09\/Chelsea-Manning.png\" ><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-98664\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2017\/09\/Chelsea-Manning.png\" alt=\"\" width=\"130\" height=\"130\" \/><\/a><em>Chelsea Manning is an advocate of government transparency, a transgender rights activist and a former United States Army intelligence analyst. In 2013 she was convicted under the Espionage Act for leaking classified documents about the wars in Iraq and Afghanistan. Her sentence was commuted by President Obama in January and she was released in May.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em>This is an article from <a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/spotlight\/world-review-the-state-of-democracy\" >World Review: The State of Democracy<\/a>, a special section that examines global policy and affairs through the perspectives of thought leaders and commentators. <\/em><\/p>\n<p><em>A version of this op-ed appears in print on September 14, 2017, in The International New York Times. <\/em><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/www.nytimes.com\/2017\/09\/13\/opinion\/chelsea-manning-big-data-dystopia.html?mcubz=1&amp;_r=0&amp;mtrref=www.facebook.com&amp;assetType=opinion\" >Go to Original \u2013 nytimes.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>13 Sep 2017 &#8211; For seven years, I didn\u2019t exist. While incarcerated, I had no bank statements, no bills, no credit history. In our interconnected world of big data, I appeared to be no different than a deceased person. After I was released, that lack of information about me created a host of problems, from difficulty accessing bank accounts to trouble getting a driver\u2019s license and renting an apartment.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-98661","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/98661","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=98661"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/98661\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=98661"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=98661"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=98661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}