Tuesday 6 December 2011

The New Cyber-Industrial Complex Spying on Us

WikiLeaks' Spy Files reveal the frightening scale and ambition of the industry now devoted to surveillance of all our daily lives

Pratap Chatterjee                               Guardian/UK via Common Dreams                          Dec. 3, 2011

We live digital lives now, flitting from Facebook to YouTube, checking our iPhones and BlackBerries, and chatting with our loved ones on Skype. Very few of us worry too much about tweeting our personal opinions on politics or chatting with a new social network "friend" on the other side of the world, whom we barely know. Yet all these interactions have become fodder for a new industry that secretly vacuums up the data and preserves it forever. This industry offers new tools to search that data and reconstruct our past, and even our real-time movements via our mobile phones, in a way that could well come back to haunt us.

WikiLeaks has just released the Spy Files – a trove of almost 300 documents from these companies that shine a light into this industry. It's worth spending some time browsing through this material because what this new industry offers to do is nothing short of Orwellian. "We are all aware of traditional spy stories of intelligence agencies like MI5 bugging the phones of one or two people," Julian Assange, the founder of WikiLeaks, told us. He continued: "In the last ten years, something else has happened. We now see mass surveillance, where the entire phone calls of a nation can be and are recorded by a company. In five or six years' time, if your brother or someone becomes of interest to that company or the government, they can go back to see what you said or what you emailed." Government authorities and the makers of these products argue that there is an urgent need for these tools – to track down criminals and terrorists, to block child pornography and computer viruses – a practice known as "lawful interception".

This is big business for i2, a company based in Virginia, which sells software that allows law enforcement to make sense of reams of data. Government Computer News ran a story earlier this week about the "Digital Dragnet" – extolling the benefits of data analysis. The magazine quoted Bob Griffin, the CEO of i2:

When we started this more than ten years ago, we talked about things like information-sharing and gathering as much data as you could," Griffin said. "In those days, people would look at you like you're a green banana. Why would I want to bring information from business licenses or hunting and fishing licenses into the policing environment?

Police authorities are excited about the potential: Jason Scheiss, analytical services division manager at the Durham police department in North Carolina, told Government Computer News that they were hoping to expand the data-collecting to include data on water and sewage billing, visitor logs from parks and recreation facilities and correlate it with the daily jail list. "So we could say, 'Hey, look here. All of these crimes only occur when this one guy's not in jail,'" he told the magazine.

Therein lies the rub: apart from the massive violation of individual privacy, or the risk of abuse by corrupt officials, these tools could easily allow security agencies to jump to the wrong conclusion. Indeed, these tools have the potential to make computer cables as dangerous as police batons. "What we are seeing is the militarization of cyberspace. It's like having a tank in your front garden," says Assange.

You have been warned and you have a choice: you can avoid the wonderful world of the internet (unlikely, since you are reading this online) and digital data (virtually impossible if you pay for electricity or go camping) – or you can join the movement to say there need to be limits to how government authorities use our information against us. And if you choose the latter, check out WikiLeaks and Privacy International.

 [Abridged]

© 2011
Pratap Chatterjee is the author of two books about the war on terror.
 http://www.guardian.co.uk/commentisfree/cifamerica/2011/dec/02/cyber-industrial-complex-spying?newsfeed=true

No comments:

Post a Comment