Read Data and Goliath Online

Authors: Bruce Schneier

Data and Goliath (50 page)

The second is “signature strikes”:
John Kaag and Sarah Kreps (2014),
Drone Warfare
, Wiley, chap. 12, http://books.google.com/books?id=I8oOBAAAQBAJ.

half of all kills were signature strikes:
Richard Engel and Robert Windrem (5 Jun 2013), “CIA didn’t always know who it was
killing in drone strikes, classified documents show,”
NBC News
, http://investigations.nbcnews.com/_news/2013/06/05/18781930-cia-didnt-always-know-who-it-was-killing-in-drone-strikes-classified-documents-show.

surveillance that is essentially indefinite:
Karen McVeigh (27 Aug 2013), “NSA surveillance program violates the constitution,
ACLU says,”
Guardian
, http://www.theguardian.com/world/2013/aug/27/nsa-surveillance-program-illegal-aclu-lawsuit.

the Great Firewall of China:
Oliver August (23 Oct 2007), “The Great Firewall: China’s misguided—and futile—attempt
to control what happens online,”
Wired
, http://www.oliveraugust.com/journalism_chinas-internet-heroes.htm.

The goal is less to banish:
Gary King, Jennifer Pan, and Margaret E Roberts (May 2013), “How censorship in China
allows government criticism but silences collective expression,”
American Political Science Review
107, http://gking.harvard.edu/publications/how-censorship-china-allows-government-criticism-silences-collective-expression.

The firewall works pretty well:
Caitlin Dewey (12 Aug 2013), “Wikipedia largely alone in defying Chinese self-censorship
demands,”
Washington Post
, http://www.washingtonpost.com/blogs/worldviews/wp/2013/08/12/wikipedia-largely-alone-in-defying-chinese-self-censorship-demands.

more government censorship on the Internet:
Ronald Deibert et al., eds. (2010),
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
, MIT Press, http://mitpress.mit.edu/books/access-controlled. John D. Sutter (19 Jun
2012), “Google reports ‘alarming’ rise in government censorship requests,” CNN, http://www.cnn.com/2012/06/18/tech/web/google-transparency-report.

France, Germany, and Austria censor:
Forbes (25 Dec 2
000
), “Swastika.com,”
Forbes
, http://www.forbes.com/forbes/2
000
/1225/6616164s1.html.

Vietnam’s “Decree 72”:
British Broadcasting Corporation (1 Sep 2013), “Vietnam internet restrictions come
into effect,”
BBC News
, http://www.bbc.com/news/world-asia-23920541.

Many countries censor content:
Ronald Deibert et al., eds, (2008),
Access Denied: The Practice and Policy of Global Internet Filtering
, MIT Press, http://mitpress.mit.edu/books/access-denied.

The UK censors pornography:
Ben Quinn (10 Oct 2011), “Biggest four UK ISPs switching to ‘opt-in’ system for
pornography,”
Guardian
, http://www.theguardian.com/society/2011/oct/11/pornography-internet-service-providers.
Anthony Faiola (28 Sep 2013), “Britain’s harsh crackdown on Internet porn prompts
free-speech debate,”
Washington Post
, http://www.washingtonpost.com/world/europe/britains-harsh-crackdown-on-internet-porn-prompts-free-speech-debate/2013/09/28/d1f5caf8-2781-11e3-9372-92606241ae9c_story.html.

the US censored WikiLeaks:
Ewen MacAskill (1 Dec 2010), “WikiLeaks website pulled by Amazon after U.S. political
pressure,”
Guardian
, http://www.theguardian.com/media/2010/dec/01/wikileaks-website-cables-servers-amazon.

Russian law requiring bloggers:
Neil MacFarquhar (6 May 2014), “Russia quietly tightens reins on web with ‘Bloggers
Law,’”
New York Times
, http://www.nytimes.com/2014/05/07/world/europe/russia-quietly-tightens-reins-on-web-with-bloggers-law.html.

Those who do the reporting:
The deputizing of citizens to report on each other is toxic to society. It creates
a pervasive fear that unravels the social bonds that hold society together. Bruce
Schneier (26 Apr 2007), “Recognizing ‘hinky’ vs. citizen informants,”
Schneier on Security
, https://www.schneier.com/blog/archives/2007/04/recognizing_hin_1.html.

Internet companies in China:
Jason Q. Ng (12 Mar 2012), “How China gets the Internet to censor itself,”
Waging Nonviolence
, http://wagingnonviolence.org/feature/how-china-gets-the-internet-to-censor-itself.

the more severe the consequences:
Cuiming Pang (2008), “Self-censorship and the rise of cyber collectives: An anthropological
study of a Chinese online community,”
Intercultural Communication Studies
18, http://www.uri.edu/iaics/content/2008v17n3/05%20Cuiming%20Pang.pdf.

Surveillance has a:
Gregory L. White and Philip G. Zimbardo (May 1975), “The chilling effects of surveillance:
Deindividuation and reactance,” Office of Naval Research/National Technical Information
Service, http://www.dtic.mil/dtic/tr/fulltext/u2/a013230.pdf.

The net result is that GPS:
US Supreme Court (23 Jan 2012), “Decision,”
United States v. Jones
(No. 10-1259), http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=US&navby=case&vol=
000
&invol=10-1259#opinion1.

Eben Moglen wrote:
Eben Moglen (27 May 2014), “Privacy under attack: The NSA files revealed new threats
to democracy,”
Guardian
, http://www.theguardian.com/technology/2014/may/27/-sp-privacy-under-attack-nsa-files-revealed-new-threats-democracy.

Sources are less likely to contact:
G. Alex Sinha (28 Jul 2014), “With liberty to monitor all,”
Human Rights Watch, http://www.hrw.org/reports/2014/07/28/liberty-monitor-all.

Lawyers working on cases:
In 2014, we learned that the Australian Signals Directorate (ASD), Australia’s NSA
counterpart, eavesdropped on communications between the US law firm Mayer Brown and
its client the government of Indonesia. The ASD passed those communications to the
NSA. James Risen and Laura Poitras (15 Feb 2014), “Spying by NSA ally entangled US
law firm,”
New York Times
, http://www.nytimes.com/2014/02/16/us/eavesdropping-ensnared-american-law-firm.html.

they worry that their conversations:
G. Alex Sinha (28 Jul 2014), “With liberty to monitor all,” Human Rights Watch, http://www.hrw.org/reports/2014/07/28/liberty-monitor-all-0.

Post-9/11 surveillance has caused:
PEN America (2013), “Chilling effects: NSA surveillance drives U.S. writers to self-censor,”
http://www.pen.org/sites/default/files/Chilling%20Effects_PEN%20American.pdf.

A Pew Research Center study:
The survey was taken just after the stories broke that the NSA was collecting telephone
metadata from Verizon, and presumably from everyone else, and collecting Internet
data from companies like Google, Yahoo, Facebook, Microsoft, and Twitter. Elizabeth
Dwoskin (26 Aug 2014), “Survey: People don’t want to talk online about the NSA,”
Wall Street Journal
, http://blogs.wsj.com/digits/2014/08/26/survey-people-dont-want-to-talk-online-about-the-nsa.

nearly half of Americans have changed:
Amrita Jayakumar (2 Apr 2014), “Americans say they’re shopping less online. Blame
the NSA,”
Washington Post
, http://www.washingtonpost.com/blogs/the-switch/wp/2014/04/02/americans-say-theyre-shopping-less-online-blame-the-nsa.

Surveillance has chilled Internet use:
Dawinder S. Sidhu (2007), “The chilling effect of government surveillance programs
on the use of the Internet by Muslim-Americans,”
University of Maryland Law Journal of Race, Religion, Gender and Class
7, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1002145.

groups like environmentalists:
David Greene (6 Nov 2013), “EFF files 22 firsthand accounts of how NSA surveillance
chilled the right to association,” Electronic Frontier Foundation, https://www.eff.org/press/releases/eff-files-22-firsthand-accounts-how-nsa-surveillance-chilled-right-association.

After the Snowden revelations:
Alex Marthews and Catherine Tucker (24 Mar 2014), “Government surveillance and Internet
search behavior,” Social Science Research Network, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2412564.

UN High Commissioner on Human Rights:
United Nations High Commissioner for Human Rights (30 Jun 2014), “The right to privacy
in the digital age,” http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session27/Documents/A.HRC.27.37_en.pdf.

French president Nicolas Sarkozy:
Liz Klimas (22 Mar 2012), “Simply visiting terrorist websites could mean jail time
in France,”
Blaze
, http://www.theblaze.com/stories/2012/03/22/simply-visiting-terrorist-websites-could-mean-jail-time-in-france.

Think of how you act:
Rachel Clark (11 Jul 2013), “‘Everything about everyone’: the depth of Stasi surveillance
in the GDR,”
View East
, http://thevieweast.wordpress.com/2013/07/11/everything-about-everyone-the-depth-of-stasi-surveillance-in-the-gdr.
Oka Efagene (20 Aug 2014), “Your calls may soon be monitored: NCC,”
Pulse
, http://pulse.ng/lifestyle/tech/security-vs-privacy-your-calls-may-soon-be-monitored-ncc-id3066105.html.

There is value in dissent:
Carl Joachim Friedrich (Oct 1939), “Democracy and dissent,”
Political Quarterly
10, http://onlinelibrary.wiley.com/doi/10.1111/j.1467-923X.1939.tb00987.x/abstract.

Defending this assertion:
Bruce Schneier (2012),
Liars and Outliers: Enabling the Trust That Society Needs to Thrive
, Wiley, chap. 16, http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118143302.html.

Frank Zappa said something similar:
Frank Zappa and Peter Occhiogrosso (1989),
The Real Frank Zappa Book
, Poseidon Press, p. 185, http://books.google.com/books?id=FB0O_HCpBy0C.

We need imperfect security:
Washington University law professor Neil Richards makes the point that “new ideas
often develop best away from the intense scrutiny of public exposure.” Neil M. Richards
(May 2013), “The dangers of surveillance,”
Harvard Law Review
126, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2239412.

township can use aerial surveillance:
The city of Baltimore uses aerial photography to look for building permit violations
by comparing photographs over time with its database of issued permits. Doug Donovan
(7 Sep 2004), “A bird’s-eye view of every part of the city,”
Baltimore Sun
, http://articles.baltimoresun.com/2004-09-07/news/0409070310_1_images-deck-aerial.

replacing that judgment:
Gregory Conti (4 Apr 2014), “A conservation theory of governance for automated law
enforcement,” We Robot 2014, Coral Gables, Florida, http://robots.law.miami.edu/2014/wp-content/uploads/2013/06/Shay-etal-TheoryofConservation_final.pdf.

Ubiquitous surveillance could lead:
The “Cannibal Cop,” who chatted online with pals about raping and eating his wife
and other women, but never acted on it, serves as an example. Daniel Beekman and Dareh
Gregorian (1 Jul 2014), “‘Cannibal cop’ released into custody of his mother after
conviction overturned in stunning reversal,”
New York Daily News
, http://www.nydailynews.com/new-york/nyc-crime/conviction-cannibal-nypd-overturned-article-1.1850334.
Daniel Engber (2 Jul 2014), “The cannibal cop goes free, but what about the murderous
mechanic?”
Slate
, http://www.slate.com/articles/news_and_politics/crime/2014/07/the_cannibal_cop_gilberto_valle_goes_free_what_about_michael_van_hise_and.html.

Already law enforcement agencies:
Walter L. Perry et al. (2013), “Predictive policing: The role of crime forecasting
in law enforcement operations,” RAND Corporation, https://www.ncjrs.gov/pdffiles1/nij/grants/243830.pdf.
US National Institute of Justice (13 Jan 2014), “Predictive policing research,” http://www.nij.gov/topics/law-enforcement/strategies/predictive-policing/Pages/research.aspx.

This notion of making certain crimes:
Michael L. Rich (Mar 2013), “Should we make crime impossible?”
Harvard Journal of Law and Public Policy
36, http://www.harvard-jlpp.com/wp-content/uploads/2013/04/36_2_795_Rich.pdf.

Yochai Benkler said:
Yochai Benkler (4 Dec 2013), “System and conscience: NSA bulk surveillance and the
problem of freedom,” Center for Research on Computation and Society, Harvard University,
http://crcs.seas.harvard.edu/event/yochai-benkler-crcs-lunch-seminar and https://www.youtube.com/watch?v=6EUueRpCzpw.

secrecy is necessary:
William E. Colby (1976), “Intelligence secrecy and security in a free society,”
International Security
1, http://people.exeter.ac.uk/mm394/Intelligence%20Secrecy%20and%20Security.pdf.
James E. Knott (Summer 1975), “Secrecy and intelligence in a free society,”
Studies in Intelligence
19, https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol19no2/html/v19i2a01p_
000
1.htm.

This notion of military secrecy:
Pamela O. Long and Alex Roland (1994), “Military secrecy in antiquity and early medieval
Europe: A critical reassessment,”
History and Technology
11, http://www.tandfonline.com/doi/abs/10.1080/07341519408581866?journalCode=ghat20.

recently has changed:
Lewis A. Coser (Summer 1963), “The dysfunctions of military secrecy,”
Social Problems
11, http://www.jstor.org/discover/10.2307/798801.

In World War II, we extended:
The secrecy
and deception around D-Day is an excellent example. Jon S. Wendell (1997), “Strategic
deception behind the Normandy invasion,” US Air Force, http://www.globalsecurity.org/military/library/report/1997/Wendell.htm.
Dan Lamothe (6 Jun 2014), “Remembering the military secrecy and lies that made D-Day
successful,”
Washington Post
, http://www.washingtonpost.com/news/checkpoint/wp/2014/06/06/remembering-the-military-secrecy-and-lies-that-made-d-day-successful.

Other books

High-Speed Showdown by Franklin W. Dixon
A Matter of Pride by Harte, Marie
The Way Back from Broken by Amber J. Keyser
Dead Level by Sarah Graves
The Emperor's Edge by Buroker, Lindsay