Questo sito si avvale di cookie utili alle finalità illustrate nella Privacy Policy
Scorrendo questa pagina, cliccando su un link o proseguendo la navigazione in altra maniera, acconsenti all’uso dei cookie.

1996 * CovertAction Quarterly * Big Brother Goes High-Tech * David Banisar

Big Brother Goes High-Tech

http://mediafilter.org/caq/CAQ56brother.html

Subtler and more far-reaching means of invading privacy have become available to the government.
Discovery and invention have made it possible for the government,
by means far more effective than stretching upon the rack,
to obtain disclosure in court of what is whispered in the closet.

US Supreme Court Justice Louis Brandeis, 1928

 

Today, Justice Brandeis would be appalled by new surveillance technologies that go far beyond anything he could imagine. Rapid technological advances, in conjunction with the end of the Cold War and the demand for greater bureaucratic efficiency, are promoting a seamless web of surveillance from cradle to grave, from bankbook to bedroom. New technologies developed by the defense industry are spreading into law enforcement, civilian agencies, and private companies. At the same time, outdated laws and regulations are failing to check an expanding pattern of abuses.

In Justice Brandeis' time and up to the 1960s,surveillance was mostly tedious manual and clerical labor. Tracing people's activities required physically following them from place to place at close range, interviewing those they came in contact with, typing up the information, and storing it in file cabinets with little possibility for cross-referencing. Only governments willing to go to extremes were able to conduct widespread surveillance.Electronic surveillance was similarly a one-on-one proposition; the East German secret police, for example, employed 500,000 secret informers, 10,000 just to eavesdrop on and transcribe its citizens' conversations.

The development of powerful computers able to centrally store and process large amounts of information revolutionized surveillance. In addition to the millions of tax dollars spent developing law enforcement applications, the federal government used the new computer systems to increase the efficiency and reach of its bureaucracies. At the same time, the private sector was exploring the profit-making possibilities. Companies offering telephone, credit card, banking, and other consumer services began using massive computer systems not only to increase efficiency, but to apply to credit, marketing, and other schemes.

Now, information on almost every person in the developed world is computerized in several hundred databases collected, analyzed, and disseminated by governments and corporations. And increasingly, these computers are linked up and sharing their cyber-gossip.

Using high speed networks with advanced intelligence and single identification numbers, such as the Social Security number, computers can create instant, comprehensive dossiers on millions of People without the need for a centralized computer system.

Information on almost every person in the developed world is computerized in several hundred databases collected, analyzed, and disseminated by governments and corporations.

New developments in genetic and medical research and care, advanced transportation systems, and financial transfers have dramaticallyincreased the quantity of detail available. A body of national and international laws and agreements facilitates the transfer of information across state and national borders and frequently prevents local and national communities from regulating against invasions of privacy.

A pending bill, S. 1360, would allow credit information bureaus such as Equifax to compile giant databases of medical records without notifying patients, and would further restrict states from passing laws to protect privacy.

 

END OF THE COLD WAR

Intelligence, defense, and law enforcement agencies have a long history of stretching and breaking those legal constraints enacted to protect civil liberties. And with the end of the Cold War, defense and intelligence agencies are seeking new missions to justify their budgets and are transferring technologies to civilian applications. The CIA and National Security Agency, for example, are emphasizing economic espionage and stressing cooperation with law enforcement agencies on issues such as terrorism, drug trafficking, and money laundering.

In 1993, the Departments of Defense (DoD) and Justice (DoJ) signed a memorandum of understanding for Operations Other Than War and Law Enforcement to facilitate joint development and sharing of technology.

The government is also using grants to influence the direction of research and development (R&D). While many federal grants have been dried up by budget cuts, generous funding still flows to encourage public-private sector cooperation in computer technology. The National Laboratories, such as Rome, Ames, Sandia, and Los Alamos, have active R&D partnerships with the FBI; the National Institute of Justice is providing grants and support to transfer this technology to local and state police agencies. The DoD's Advanced Research Projects Agency (ARPA) has provided tens of millions of dollars to private companies through its Technology Reinvestment Project to help develop civilian applications for military surveillance technology.

To counteract reductions in military contracts which began in the 1980s, computer and electronics companies are expanding into new markets at home and abroad with equipment originally developed for the military. Companies such as E-Systems, Electronic Data Systems (founded by Ross Perot), and Texas Instruments are selling advanced computer and surveillance equipment to state and local governments that use them for law enforcement, border control, and administering state programs such as welfare. The companies are also pushing their products to numerous Third World countries with dismal human rights records.

Not surprisingly, repressive regimes in Thailand, China, and Turkey are using the US-made equipment to crush political dissent.

 

BUREAUCRATIC INVASIONS

The authoritarian impulse is not the only motive for the expansion of information technology. The simple need for increased bureaucratic efficiency necessitated by shrinking budgets for social spending is a force behind much of the push for improved identification and monitoring of individuals.

Fingerprints, ID cards, data matching, and other privacy-invasive schemes were originally tried on populations with little political power, such as welfare recipients, immigrants, criminals, and members of the military, and then applied up the socioeconomic ladder.

Once in place, the policies are difficult to remove and inevitably expand into more general use. Corporations are also quick to adapt these technologies for commercial use to target consumers, to manipulate markets, and to select, monitor, and control employees.

The technologies fit roughly into three broad categories: surveillance, identification, and networking.

Frequently used together as with biometrics and ID cards, or video cameras and face recognition they facilitate the mass and routine surveillance of large segments of the population without the need for warrants and formal investigations. What the East German secret police could only dream of is rapidly becoming reality in the free world.

 ID TECHNOLOGIES

 

PLAYING CARDS & NUMBERS

In a computerized and networked world, a universal unique person identifier allows easy retrieval and consolidation of data. Pressure for a single identifier ostensibly to facilitate information sharing for administrative purposes is increasing and several schemes currently in place are sliding toward a mandatory system of universal identification.

Identification numbers.

In the US, the Social Security Number (SSN) was developed in 1938 to identify workers eligible for government retirement benefits.

In 1961, the IRS began using it as a tax identification number and slowly other agencies followed. Since banks and other non-governmental entities can legally turn away customers who refuse to supply a SSN, its use in the private sector is virtually taken for granted in everything from medical insurance to telephone to credit applications.

Several bills pending in Congress would create new national databases rooted to the SSN for all eligible job holders and for welfare and immigration purposes.


bigbro1
Morpho's PR boasts its Tacoma, Washington facility can "operate 24 hours a day, 7 days a week, and can process more than 20,000 tenprint[fingerprint]cards each day."

Identification cards.

Once a system of universal identification is established, it is a short step to requiring people to have and carry ID cards. The history of ID cards is long and ignoble.

The Roman Empire used tiles called tesserae to identify slaves, soldiers, and citizens over 2,000 years ago.The most notorious modern example the South African passbook, which helped regulate apartheid contained relatively little information compared with today's cards. In addition to name, address, and identification numbers, the modern incarnation of the tesserae can include photograph, fingerprints and magnetic strips or microchips to automate entering the data into reading devices.

 In a process that privacy advocates call function creep, cards originally designed for a single-use are being expanded to link multiple databases. In Thailand, Control Data Systems set up a universal ID card to track all citizens. "Smart cards," widely used in Europe, have an embedded microchip that can hold several pages of information. Even more advanced optical technology, which can store hundreds of pages of data on a chip, is currently used in the US. Columbia/HCA Healthcare Corporation recently announced that it was providing 50,000 Florida residents with cards that could hold medical records, including X-rays.

Two soldiers have sued to keep their DNA out of registry in which the Pentagon plans to store 18 million samples for 75 years.

Multifunction cards are the next step. Utah is one of several states considering a single smart card for such diverse services as motor vehicle registration and libraries. Other federal government proposals for reinventing government call for a single card for welfare benefits, food stamps, and other federal government functions. Florida and Maryland have already experimented with the concept.

And the cards are getting smarter all the time. Active badges, already in use in numerous high-tech companies, transmit their location and, of course, that of the wearer.

 

BODY PARTS

Biometrics.
If a corporation or government goes to all this expense and trouble, it needs ways of definitively identifying individuals and making sure they are not confused with one another.

Biometrics verification through unique physical characteristics began in the late 19th century with fingerprinting. Recently, automated systems which electronically scan and digitalize fingerprints have taken the technology beyond its traditional role in criminal investigations. The FBI has spent several hundred million dollars over the last few years creating an Automated Fingerprint Identification System (AFIS).

Because of the improvements in access, fingerprints are now used for more applications at the state level as well. California and New York require all welfare beneficiaries to be fingerprinted. Even after a New York survey revealed that little fraud was actually detected by the massive fingerprinting effort, the state expanded its program to include all members of the recipient's family.

And, as in so many other cases, the technology is moving from the margins of society into the mainstream. California is now requiring thumbprints on drivers' licenses; several banks in the Southwest are fingerprinting non-customers who wish to cash checks; and a proposed California referendum would require all newborns to be fingerprinted and issued an official ID card.

A particularly steep incline on the slippery slope to universal tracking is greased with DNA. The complex molecular structure that holds a genetic code unique to each individual is present in even the smallest sample of hair, tissue, or bodily fluids.

Many states are now empowered to take DNA samples from all convicted felons. The FBI has already spent hundreds of millions of dollars on the technology and infrastructure to create a computer network to link the state databases to create a de facto central registry.

But the largest single DNA database is being proposed by the Department of Defense, which plans to create a registry of all current and former military and reserve soldiers Ostensibly designed to identify bodies, the registry would hold four million samples by 2001 and eventually be expanded to handle 18 million. Claiming that destroying the samples when the person left the service would be impractical, the DoD proposes storing the DNA for 75 years.

Two soldiers have filed suit to prevent the collection of their genetic information, arguing that it is an invasion of privacy and that there are no restrictions on how the DNA can be used.

Somewhat less physically intrusive is a system based on hand geometry, which measures the length and distances between fingers. The US, Netherlands, Canada, and Germany have started a pilot program in which international travelers will be issued a smart card that records the unique hand measurements.

Each time travelers pass through customs, they present the card and place their hand in a reader that verifies their identity and links into numerous databases. The member countries have signed an international agreement facilitating information sharing and agreeing to eventually require all international travelers to use the cards. Marketed by Control Data Systems and Canon, it already has 50,000 participants.

 

SNEAKING A PEEK

In all of these methods of verification, the targeted individual is usually aware of being checked and is often required to cooperate. To facilitate covert identification, much research is currently being conducted into facial recognition and facial thermography. Facial recognition is based on measuring facial curves from several angles, digitalizing the information, and doing a computer comparison with existing images in a database or on an ID card. NeuroMetric, a Florida manufacturer, claims that its system can scan 20 faces a second, and by 1997 will be able to scan and compare images against a database of 50 million faces in seconds.

The Immigration and Naturalization Service is spending millions in a pilot program using video cameras and computer databases to identify known illegal and criminal aliens, terrorists, drug traffickers and other persons of special interest to the US Government at airports, checkpoints and other ports-of-entry. A.C. Neilson, the large market rating company, recently patented a system using facial recognition for covertly identifying shoppers to track their buying habits around a particular region.

Facial thermography measures the characteristic heat patterns emitted by each face. Mikos Corporation claims that its Facial Access Control by Elemental Shapes (FACES) system can identify individuals regardless of temperature, facial hair, and even surgery, by measuring 65,000 temperature points with an accuracy level surpassing fingerprints. It estimates that by 1999, with a price tag of only $1,000, the devices could be used in automated teller machines, point-of-sale terminals, welfare agencies, and computer networks. One serious drawback, they admit, is that alcohol consumption radically changes the thermograms.

 

SURVEILLANCE AND DATAVEILLANCE

Unless the quality of information keeps pace with the quantity, though, the old computer motto garbage in, garbage out rules. Not surprisingly, then, the commercial and governmental forces that have pushed for improved identification technologies are also supporting ways to refine information-gathering techniques. New technologies have enhanced the ability to see through walls, overhear conversations, and track movement. At the same time, dataveillance following people through their computerized record trail has become part of daily life.

Advanced microphones. The FBI's and ARPA's Rapid Prototyping Facility at the Virginia Quantico Research Laboratory is producing microminiature electronics systems unique surveillance equipment customized for each separate investigation. They hope for a 24-hour turnaround for specifically designed devices,including a microphone on a chip. The FBI has already developed a solid-state briefcase-size electronically steerable microphone array prototype, that can discreetly monitor conversations across open areas. On the state and local level, jurisdictions such as Washington, D.C., and Redwood City, California, are considering microphone systems first developed to detect submarines. Placed around the city, they would hear gunshots and call in the location to police headquarters.

Closed Circuit Television Cameras (CCTC). Technical developments have increased the capabilities and lowered the cost of video cameras, making them a regular feature in stores and public areas. In the UK, dozens of cities have centrally controlled, comprehensive citywide CCTC systems that can track individuals wherever they go, even if they enter buildings. Effective even in extreme low light, the cameras can read a cigarette pack 100 yards away. Baltimore recently announced plans to put 200 cameras in the city center. The FBI has miniaturized CCTC units it can put in a lamp, clock radio, briefcase, duffel bag, purse, picture frame, utility pole, coin telephone, book and other [objects] and then control remotely to pan/tilt, zoom and focus.

Forward Looking Infrared (FLIR) Originally developed for use in fighter planes and helicopters to locate enemy aircraft, FLIR can detect a temperature differential as small as .18 degrees centigrade. Texas Instruments and others are marketing hand-held and automobile- and helicopter-mounted models that can essentially look through walls to determine activities inside buildings. Law enforcement agents are pointing them at neighborhoods to detect higher temperatures in houses where artificial lights are used to grow marijuana. They are also using FLIR to track people and cars on the Mexican border and search for missing people and fugitives.

Massive millimeter wave detectors. Developed by Militech Corporation, these detectors use a form of radar to scan beneath clothing. By monitoring the millimeter wave portion of the electromagnetic spectrum emitted by the human body, the system can detect items such as guns and drugs from a range of 12 feet or more. It can also look through building walls and detect activity. Militech received a $2 million grant from ARPA's Technology Reinvestment Project to fund development of working systems for local police.

Van Eck Monitoring. Every computer emits low levels of electromagnetic radiation from the monitor, processor, and attached devices. Although experts disagree whether the actual range is a only a few yards or up to a mile, these signals can be remotely recreated on another computer. Aided by a transmitting device to enhance the signals, the FBI reportedly used Van Eck Monitoring to extract information from spy Aldrich Ames' computer and relay it for analysis.

Intelligent Transportation Systems. ITS refers to a number of traffic management technologies, including crash-avoidance systems, automated toll collection, satellite-based position location, and traffic-based toll pricing. To facilitate these services, the system tracks the movements of all people using public or private transportation. As currently proposed by TRW, a leading developer of the technologies involved, the data collected on travel will be available for both law enforcement and private uses such as direct marketing. Automated toll collection is already in operation in several states, including New York, Florida, and California. Tracking systems for counterintelligence purposes are also already in place in New York City, where the FBI has set up a permanent real time physical tracking system. On a commercial level, insurers are pushing car owners to install the Lojack, which is supposed to help retrieve stolen cars by sending out location signals once the system is remotely activated. Since cellular phones transmit location information to the home system to determine call routing, they can also be used for automated tracking of the caller's movements. In 1993, fugitive Colombian drug kingpin Pablo Escobar was pinpointed through his cellular phone. Currently there is an effort to develop a 911 system for cellular systems that would give location information for every cellular phone.

Digital Cash. Potentially, digital cash will create one of the most comprehensive systems for the collection of information on individuals. Using computer software and smart cards to replace physical cash, consumers can spend virtual money for small transactions such as reading an electronic newspaper online, making phone calls from pay phones, paying electronic tolls, buying groceries, as well as for any transaction currently done through credit cards. Since most of the systems under development (such as the one by Mondex in Canada and the UK), retain information on each transaction, they create an unprecedented amount of information on individual preferences and spending habits. Another system, Digicash, which provides for anonymous online transactions, is offered by the Mark Twain Bank in St. Louis. Federal intelligence and law enforcement agencies have been fighting anonymous digital cash on the grounds that it could be used for money laundering.