Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Our Internet Surveillance State
Crypto-Gram ^ | 3/15/13 | Bruce Schneier

Posted on 04/20/2013 1:03:03 PM PDT by zeugma

Our Internet Surveillance State

I'm going to start with three data points.

One: Some of the Chinese military hackers who were implicated in a broad set of attacks against the U.S. government and corporations were identified because they accessed Facebook from the same network infrastructure they used to carry out their attacks.

Two: Hector Monsegur, one of the leaders of the LulzSec hacker movement, was identified and arrested last year by the FBI. Although he practiced good computer security and used an anonymous relay service to protect his identity, he slipped up.

And three: Paula Broadwell, who had an affair with CIA director David Petraeus, similarly took extensive precautions to hide her identity. She never logged in to her anonymous e-mail service from her home network. Instead, she used hotel and other public networks when she e-mailed him. The FBI correlated hotel registration data from several different hotels -- and hers was the common name.

The Internet is a surveillance state. Whether we admit it to ourselves or not, and whether we like it or not, we're being tracked all the time. Google tracks us, both on its pages and on other pages it has access to. Facebook does the same; it even tracks non-Facebook users. Apple tracks us on our iPhones and iPads. One reporter used a tool called Collusion to track who was tracking him; 105 companies tracked his Internet use during one 36-hour period.

Increasingly, what we do on the Internet is being combined with other data about us. Unmasking Broadwell's identity involved correlating her Internet activity with her hotel stays. Everything we do now involves computers, and computers produce data as a natural by-product. Everything is now being saved and correlated, and many big-data companies make money by building up intimate profiles of our lives from a variety of sources.

Facebook, for example, correlates your online behavior with your purchasing habits offline. And there's more. There's location data from your cell phone, there's a record of your movements from closed-circuit TVs.

This is ubiquitous surveillance: All of us being watched, all the time, and that data being stored forever. This is what a surveillance state looks like, and it's efficient beyond the wildest dreams of George Orwell.

Sure, we can take measures to prevent this. We can limit what we search on Google from our iPhones, and instead use computer web browsers that allow us to delete cookies. We can use an alias on Facebook. We can turn our cell phones off and spend cash. But increasingly, none of it matters.

There are simply too many ways to be tracked. The Internet, e-mail, cell phones, web browsers, social networking sites, search engines: these have become necessities, and it's fanciful to expect people to simply refuse to use them just because they don't like the spying, especially since the full extent of such spying is deliberately hidden from us and there are few alternatives being marketed by companies that don't spy.

This isn't something the free market can fix. We consumers have no choice in the matter. All the major companies that provide us with Internet services are interested in tracking us. Visit a website and it will almost certainly know who you are; there are lots of ways to be tracked without cookies. Cell phone companies routinely undo the web's privacy protection. One experiment at Carnegie Mellon took real-time videos of students on campus and was able to identify one-third of them by comparing their photos with publicly available tagged Facebook photos.

Maintaining privacy on the Internet is nearly impossible. If you forget even once to enable your protections, or click on the wrong link, or type the wrong thing, you've permanently attached your name to whatever anonymous service you're using. Monsegur slipped up once, and the FBI got him. If the director of the CIA can't maintain his privacy on the Internet, we've got no hope.

In today's world, governments and corporations are working together to keep things that way. Governments are happy to use the data corporations collect -- occasionally demanding that they collect more and save it longer -- to spy on us. And corporations are happy to buy data from governments. Together the powerful spy on the powerless, and they're not going to give up their positions of power, despite what the people want.

Fixing this requires strong government will, but they're just as punch-drunk on data as the corporations. Slap-on-the-wrist fines notwithstanding, no one is agitating for better privacy laws.

So, we're done. Welcome to a world where Google knows exactly what sort of porn you all like, and more about your interests than your spouse does. Welcome to a world where your cell phone company knows exactly where you are all the time. Welcome to the end of private conversations, because increasingly your conversations are conducted by e-mail, text, or social networking sites.

And welcome to a world where all of this, and everything else that you do or is done on a computer, is saved, correlated, studied, passed around from company to company without your knowledge or consent; and where the government accesses it at will without a warrant.

Welcome to an Internet without privacy, and we've ended up here with hardly a fight.

This essay previously appeared on CNN.com, where it got 23,000 Facebook likes and 2,500 tweets -- by far the most widely distributed essay I've ever written.
http://www.cnn.com/2013/03/16/opinion/...

How the Chinese hackers were identified:
http://security.blogs.cnn.com/2013/02/19/...
http://www.washingtonpost.com/blogs/worldviews/wp/...

How Sabu was identified:
http://www.cnn.com/2012/03/06/us/...
http://arstechnica.com/tech-policy/2012/03/...

How Paula Broadwell was identified:
http://www.cnn.com/2012/11/10/politics/...
http://www.aclu.org/blog/...

Facebook tracking:
http://lifehacker.com/5843969/...
http://www.firstpost.com/tech/...

Collusion results:
http://www.theatlantic.com/technology/archive/2012/...

Data brokers building intimate profiles:
https://www.propublica.org/article/...

Correlating online behavior with offline purchasing habits:
http://adage.com/article/digital/...

Ubiquitous surveillance:
http://www.schneier.com/essay-109.html
http://www.washingtonpost.com/wp-dyn/content/...
http://www.propublica.org/article/...

Data harvesting from social networking sites:
http://www.propublica.org/article/...

Internet tracking:
http://queue.acm.org/detail.cfm?id=2390758
http://news.cnet.com/8301-1009_3-20005185-83.html
http://panopticlick.eff.org

Cell phone surveillance:
http://www.schneier.com/blog/archives/2013/01/...

Carnegie Mellon identification experiment:
http://www.heinz.cmu.edu/~acquisti/...

Google's StreetView fine:
http://www.nytimes.com/2013/03/13/technology/...

The death of ephemeral conversation:
http://www.schneier.com/blog/archives/2008/11/...

National Security Letters:
http://epic.org/privacy/nsl/

The value of privacy:
http://www.schneier.com/essay-114.html

Commentary:
http://www.infoworld.com/t/cringely/...
http://blog.simplejustice.us/2013/03/17/...
http://telekommunisten.net/2013/03/27/...


 


TOPICS: Business/Economy; Crime/Corruption; Culture/Society; Government
KEYWORDS: internet; privacy; surveillance; tech
Navigation: use the links below to view more comments.
first previous 1-2021-29 last
To: bitterohiogunclinger; null and void; Rushmore Rocks; thouworm; Slings and Arrows; azishot; ...

Well, at least they know where my cell phone is all the time.<<<<

I keep losing my cell phone, and since they know the location, would they be willing to help find it? Do they have a toll-free number I could call?

Me: Hello Phone Surveillance, my cell phone is missing, again. Any ideas where it might be?

Phone Surveillance: Hello, Lucy. Your phone is in your pink blouse pocket in the laundry basket.

Me: Okay, thanks! ‘Bye now.

Phone Surveillance: Wait! There’s more. One of the buttons is loose and needs repairing before you lose it, too.

Me: Oh, I hadn’t noticed... well, thanks again. G’Bye.


21 posted on 04/20/2013 3:29:43 PM PDT by LucyT
[ Post Reply | Private Reply | To 18 | View Replies]

To: zeugma; LucyT

Great piece,we risk it all every time we stand up for what is right.Truth is it really doesn’t matter anyway. If the regime or others want you they simply make up. fabricate BS and off you go.


22 posted on 04/20/2013 4:05:57 PM PDT by rodguy911 (FreeRepublic:Land of the Free because of the Brave--Sarah Palin our secret weapon)
[ Post Reply | Private Reply | To 1 | View Replies]

To: volunbeer
they can use computers to comb the raw data with surprising efficiency.

"How hard is it to 'de-anonymize' cellphone data?"

23 posted on 04/20/2013 4:24:20 PM PDT by glorgau
[ Post Reply | Private Reply | To 5 | View Replies]

To: LucyT

LOL! I love your humor. Maybe they could suggest what new phone I should get.


24 posted on 04/20/2013 6:59:19 PM PDT by azishot
[ Post Reply | Private Reply | To 21 | View Replies]

To: LucyT

Thanks for the PING!


25 posted on 04/20/2013 7:35:55 PM PDT by Graewoulf (Traitor John Roberts' Commune-Style Obama'care' violates U.S. Constitution AND Anti-Trust Law.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: zeugma
Fine...know me...track me...plaster my web pages with ads for Papajohns after I just ordered Papajohns (genius there, I tell ya)...but no one, no one I tell ya (mwaaaaaahahaha), will ever know I tuck my t-shirt into my underwear.

Wait! Ahhhhhhhhhhhh...did I just....???? Oh, damn you blasted interweb thingy!

26 posted on 04/20/2013 7:45:26 PM PDT by IrishPennant (All warfare is based on deception.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: palmer
Important data (e.g gun registration) is not comparable to favorite ice cream. The government already chokes on the amount of data it has so far, and it sure as heck doesn’t make us any safer. The best antidote is to make government smaller and keep it from nosing into the wrong areas.

Absolutely agree. Smaller government would be beneficial all the way around. Another way to combat the information vacuums is to give it bogus information any time you can. The more garbage the system contains, the less useful are conclusions drawn from it.

27 posted on 04/20/2013 8:52:55 PM PDT by zeugma (Those of us who work for a living are outnumbered by those who vote for a living.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: zeugma
Data mining is big freaking business and it's really only in its infancy

Yes. I did nothing but data mining in my previous employment.

I could extract key phrases out of anectodal text data from terabytes of tech center trouble calls. ID the product type, problem description, and ANY OTHER phrase the quality dept. thought useful.

These were not fielded data base records, just typed in responses to customer trouble calls. The telecom industry had to report outages etc.

I compiled all this into reports showing equipment type and problem type, as well any anthing else wanted.

I then automated it into a single push button on a menu that downloaded, processed, and presented all this.

And this was a while back...

28 posted on 04/21/2013 5:29:43 AM PDT by Huebolt (A country that has tipped will fall. RIP USA)
[ Post Reply | Private Reply | To 20 | View Replies]

To: LucyT

hahahaha!!!!


29 posted on 04/21/2013 6:59:02 AM PDT by NoGrayZone (For evil to triumph it is only necessary for good men to do nothing.)
[ Post Reply | Private Reply | To 21 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-29 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson