opinions-political-privacy

http://www.ohio.com/mld/ohio/news/6211959.htm

WASHINGTON - The Pentagon is developing an urban surveillance system that would use computers and thousands of cameras to track, record and analyze the movement of every vehicle in a foreign city.

...

Police, scientists and privacy experts say the unclassified technology could easily be adapted to spy on Americans.

...

"Government would have a reasonably good idea of where everyone is most of the time," said John Pike, a Global Security.org

...

But scientists envision nonmilitary uses. "One can easily foresee pressure to adopt a similar approach to crime-ridden areas of American cities or to the Super Bowl or any site where crowds gather," said Steven Aftergood of the Federation of American Scientists.

Pike agreed.

"Once DARPA demonstrates that it can be done, a number of companies would likely develop their own version in hope of getting contracts from local police, nuclear plant security, shopping centers, even people looking for deadbeat dads."

James Fyfe, a deputy New York police commissioner, believes police will be ready customers for such technologies.

...

Though insisting CTS isn't intended for homeland security, DARPA outlined a hypothetical scenario for contractors in March that showed the system could aid police as well as the military. DARPA described a hypothetical terrorist shooting at a bus stop and a hypothetical bombing at a disco one month apart in Sarajevo, Bosnia-Herzegovina, a city with slightly more residents than Miami.

CTS should be able to track the day's movements for every vehicle that passed each scene in the hour before the attack, DARPA said. Even if there were 2,000 such vehicles and none showed up twice, the software should automatically compare their routes and find vehicles with common starting and stopping points.

Joseph Onek of the Open Society Institute, a human rights group, said current law that permits the use of cameras in public areas may have to be revised to address the privacy implications of these new technologies.

"It's one thing to say that if someone is in the street he knows that at any single moment someone can see him," Onek said. "It's another thing to record a whole life so you can see anywhere someone has been in public for 10 years."

--- http://www.pbs.org/cringely/pulpit/pulpit20030710.html

Shooting Ourselves in the Foot: Grandiose Schemes for Electronic Eavesdropping May Hurt More Than They Help

By Robert X. Cringely

Whom do you trust? If you are a policeman, you trust the police. How much information is enough? When it comes to the electronic gathering of intelligence information, it appears that no amount of information is enough. These two concepts have collided in America with the result that creating the very capability of gathering electronic intelligence is putting all of us in greater danger. The supposed cure may be worse than the disease. Maybe -- and only maybe -- we know a little more about what the bad guys in our society are doing, but it is coming at what might be a horrible cost. And a big part of the problem is that if you are a policeman, you trust the police.

The Federal Bureau of Investigation administers the Communications Assistance to Law Enforcement Act (CALEA), which was passed by Congress in 1994. CALEA was a response to advances in digital communications. It was a way for law enforcement and intelligence agencies to go beyond old-fashioned phone taps and listen in on mobile phone calls, pagers, the Internet and any other form of electronic messaging that might be used by enemies of the state. CALEA made the phone companies and pager companies and Internet companies responsible for building into their equipment the capability to tap all types of communications on the order of a judge or -- in the case of foreign surveillance -- of the U.S. Attorney General. Every telephone switch installed in the U.S. since 1995 is supposed to have this surveillance capability, paid for, by the way, with $500 million of your tax dollars. Not only can the authorities listen to your phone calls, they can follow those phone calls back upstream and listen to the phones from which calls were made. They can listen to what you say while you think you are on hold. This is scary stuff.

But not nearly as scary as the way CALEA's own internal security is handled. The typical CALEA installation on a Siemens ESWD or a Lucent 5E or a Nortel DMS 500 runs on a Sun workstation sitting in the machine room down at the phone company. The workstation is password protected, but it typically doesn't run Secure Solaris. It often does not lie behind a firewall. Heck, it usually doesn't even lie behind a door. It has a direct connection to the Internet because, believe it or not, that is how the wiretap data is collected and transmitted. And by just about any measure, that workstation doesn't meet federal standards for evidence integrity.

And it can be hacked.

And it has been.

Israeli companies, spies, and gangsters have hacked CALEA for fun and profit, as have the Russians and probably others, too. They have used our own system of electronic wiretaps to wiretap US, because you see that's the problem: CALEA works for anyone who knows how to run it. Not all smart programmers are Americans or wear white hats. We should know that by now. CALEA has probably given up as much information as it has gathered. Part of this is attributable to poor design and execution, part to pure laziness, part to the impossibility of keeping such a complex yet accessible system totally secure, and part because hey, they're cops, they're good guys. Give 'em a break. Have a donut.

This vulnerability is never discussed in public because it is an embarrassment to law enforcement and because the agencies that pay for CALEA don't want its vulnerability to be known. That might compromise national security. Alas, national security is already compromised by the system itself, and the people who might take advantage of the vulnerability have known about it for years. Only we are kept in the dark.

In a sense I think the problem comes down to the "dumbing down of IT." The biggest problem with CALEA is the people managing it. They don't know it needs to be secured. This column, for example, will be widely distributed, but will have no impact whatsoever on the folks it should because they simply won't get it.

I suspect the people actually running the system know a bit more and probably have suggested it from time to time. Like many government systems, you can't fix it until you're TOLD to fix it, and you won't be told to fix it until there is funding. And the funding will usually be accompanied by explicit instructions on how to fix it, right or wrong. In the corporate world IT has been under attack and downsized for years. Forget training. Forget expertise. There is a belief that by just buying a firewall, you solve all your security issues. If you have a firewall, why do you need to have someone track and install all those security patches on all your computers? Many of IT's biggest problems are simply repeats of past problems. Through this "dumbing down" process we've lost the ability to stop the cycle.

Even if CALEA were secure, it would still be a danger because of its capability to do what are called "roving wiretaps." Old-fashioned wiretaps did just that, they tapped wires, but today's criminals and terrorists are mobile. They use throwaway cell phones and conference calls and 800 numbers to mask their communications so CALEA targets the criminal, not the phone line. This means that CALEA effectively taps every phone that is connected at any time to the roving subject. Phone conversations can be followed from line to line and each of those phone lines becomes, at least for a while, a target. Dozens, hundreds, thousands of numbers can get swept up and recorded whether it is a conversation with a lawyer, a priest, or a journalist.

That's what led me to this story. In the Lacie Peterson murder case in California, thousands of Scott Peterson's phone conversations were recorded using CALEA technology. Some of those conversations were between Peterson and his lawyer, some between Peterson and the press. None of them were with me. I have no idea whether Scott Peterson is guilty or innocent, and it doesn't matter at all to this column. What matters is that a few days ago 176 new phone conversations were "discovered."

How do you "discover" a recorded phone conversation in a totally automated system? If you can discover a conversation, then you can also lose one a la Rosemary Woods and the famous 17-minute gap in that Watergate tape. The whole system becomes suspect and subject to abuse.

And abuse does happen. In the late 1990s the Los Angeles Police Department conducted illegal wiretaps with CALEA technology involving thousands of phone lines and potentially hundreds of thousands of people at a time when the official annual report on wiretaps compiled by the Department of Justice said L.A. was conducting an average of around 100 wiretaps per year. Illegal convictions were obtained, property was illegally confiscated, civilian careers and lives were ruined, yet nobody was punished.

But wait, there's more! CALEA represents mid-90s thinking about electronic intelligence, but now we have the Patriot Act that goes so much further. And we have a program at the Defense Advanced Projects Research Agency called Total Information Awareness. I am sorry to quote so extensively from a DARPA document (unclassified), but you need to get a sense of the epic scope of this proposal, which sounds like Big Brother to me:

"OBJECTIVES: (1) Development of revolutionary technology for ultra-large all-source information repositories and associated privacy protection technologies. (2) Development of collaboration, automation, and cognitive aids technologies that allow humans and machines to think together about complicated and complex problems more efficiently and effectively. (3) Development and implementation of an end-to-end, closed-loop prototype system to aid in countering terrorism through prevention by integrating technology and components from existing DARPA programs such as: Genoa, EELD (Evidence Extraction and Link Discovery), WAE (Wargaming the Asymmetric Environment), TIDES (Translingual Information Detection, Extraction and Summarization), HID (Human Identification at Distance), Bio-Surveillance; as well as programs resulting from the first two areas of this BAA and other programs."

"Repository Issues: The National Security Community has a need for very large scale databases covering comprehensive information about all potential terrorist threats; those who are planning, supporting or preparing to carry out such events; potential plans; and potential targets. In the context of this BAA, the term "database" is intended to convey a new kind of extremely large, omni-media, virtually-centralized, and semantically-rich information repository that is not constrained by today's limited commercial database products -- we use "database" for lack of a more descriptive term. DARPA seeks innovative technologies needed to architect, populate, and exploit such a database for combating terrorism. Key metrics include the amount of total information that is potentially covered, the utility of its data structures for data entry and use by humans and machines in searching and browsing, data integration, and capability to automatically populate, and the completeness, correctness, and timeliness of the information when used for predictive analysis and modeling in exploiting the information in these repositories. It is anticipated this will require revolutionary new technology."

"The database envisioned is of an unprecedented scale, will most likely be distributed, must be capable of being continuously updated, and must support both autonomous and semi-automated analysis. The latter requirement implies that the representation used must, to the greatest extent possible, be interpretable by both algorithms and human analysts. The database must support change detection and be able to execute automated procedures implied by new information. Because of expected growth and adaptation needs, the effective schema must be adaptable by the user so that as new sources of information, analytical methods, or representations arise, the representation of data may be re-structured without great cost. If distributed, the database may require new search methods to answer complex, less than specific queries across physical implementations and new automated methods for maintaining consistency. The reduced signature and misinformation introduced by terrorists who are attempting to hide and deceive imply that uncertainty must be represented in some way. To protect the privacy of individuals not affiliated with terrorism, DARPA seeks technologies for controlling automated search and exploitation algorithms and for purging data structures appropriately. Business rules are required to enforce security policy and views appropriate for the viewer's role."

"The potential sources of information about possible terrorist activities will include extensive existing databases. Innovative technologies are sought for treating these databases as a virtual, centralized, grand database. This will require technologies for automatically determining schemas, access methods and controls, and translation of complex English language queries into the appropriate language for the relevant databases."

"DARPA currently has on-going research programs aimed at language translation, information extraction from text, and multi-modal biometric technologies. These component technologies will be used to feed the Information Awareness database but must be augmented by other technologies and new sources of information to dramatically increase the coverage of counter-terrorism information. These other technologies include but are not limited to innovative new methods of database integration, structured information authoring, and exploitation of integrated data streams. Non-traditional methods of identifying and monitoring terrorist activity are anticipated. Populating a database with information derived from masked or deceptive behavior by an adversary is a challenging technical problem. DARPA invites new ideas for novel information sources and methods that amplify terrorist signatures and enable appropriate response."

"Collaboration, Automation And Cognitive Aids Issues: DARPA will be developing technology to support collaborative work by cross-organizational teams of intelligence and policy analysts and operators as they develop models and simulations to aid in understanding the terrorist threat, generate a complete set of plausible alternative futures, and produce options to deal proactively with these threats and scenarios. The challenges such teams face include the need to work faster, overcome human cognitive limitations and biases when attempting to understand complicated, complex, and uncertain situations, deal with deliberate deception, create explanations and options that are persuasive for the decision maker, break down the information and procedural stovepipes that existing organizations have built, harness diversity as a tool to deal with complexity and uncertainty, and automate that which can effectively be accomplished by machines so that people have more time for analysis and thinking. Emphasis needs to be placed on ease of use, adaptation to the user who is often not a scientist or engineer, and implicit encouragement to use the tools to make the users' tasks easier."

"DARPA is seeking innovative technology for automating some of the team processes; augmenting the human intellect via tools that assist teams thinking together, tools that do some of the thinking for people, and tools that support human/machine collaboration in the cognitive domain; and for providing a rich environment for collaboration across existing hierarchical organizations while maintaining the necessary accountability and control. DARPA envisions that the human teams using its system will be drawn from multiple organizations spanning state, local, and federal government. Thus, there will be the need to permit collaboration across organizational-boundaries while providing control and accountability and connection back to the central systems of each participating organization. Technology will be required to support the entire life cycle of such teams. Key challenges include knowledge management/corporate memory, declarative policy generation and context-based enforcement, business rules and self-governance, and planning and monitoring team processes."

"The goals for automation technology include speeding the front-end processes of gathering, filtering, and organizing information and assimilating its content without having to read all of it. On the back-end of the process, technology is needed to automate or semi-automate the generation of efficient and persuasive explanations, and to maintain consistency within a large, distributed multi-media knowledge base. Technology is also required to make the tools and the collaborative environment itself more efficiently used by humans by making it aware of user context and preferences and smart and adaptive to optimize the user experience. DARPA seeks technology to aid the human intellect as teams collaborate to build models of existing threats, generate a rich set of threat scenarios, perform formal risk analysis, and develop options to counter them. These tools should provide structure to the collaborative cognitive work, and externalize it so that it can be examined, critiqued, used to generate narrative and multi-media explanations, and archived for re-use."

Back to Cringely: How, exactly, are they going to automate the protection of our privacy?

No sane person is in favor of terrorism or lawlessness. But at a time when intelligence agencies are under fire for being not very intelligent, when our leaders are sometimes in too big a hurry to cast blame and take credit, we are building huge information gathering systems that we can't completely control, we can't completely validate, that can be turned against us by our enemies, and that can ultimately be used to justify, well, anything.

It might be a good idea to think twice about this before we shoot ourselves in the foot.


perhaps the only way to find safety in a world that is turning into 1984 is to go public -- have a full-audio webcam, make most files on one's computer readable, etc

---