Read Data and Goliath Online

Authors: Bruce Schneier

Data and Goliath (67 page)

Indomitability is the correct response:
Bruce Schneier (7 Jan 2012), “Our reaction is the real security failure,”
AOL News
, https://www.schneier.com/essays/archives/2010/01/our_reaction_is_the.html.

There’s hope for the US:
John Mueller and Mark G. Stewart (2011),
Terror, Security, and Money: Balancing the Risks, Benefits, and Costs of Homeland
Security
, Oxford University Press, chap. 9, http://books.google.com/books?id=l1IrmjCdguYC&pg=PA172.

it’s well past time to move beyond fear:
I even wrote a book with that title. Bruce Schneier (2003),
Beyond Fear: Thinking Sensibly about Security in an Uncertain World
, Wiley, http://books.google.com/books/about/?id=wuNImmQufGsC.

shift in Americans’ perceptions:
Nate Silver (10 Jul 2013), “Public opinion shifts on security-liberty balance,”
Fivethirtyeight
,
New York Times
, http://fivethirtyeight.blogs.nytimes.com/2013/07/10/public-opinion-shifts-on-security-liberty-balance.

Our personal definitions of privacy:
New York University law professor Helen Nissenbaum argues that privacy can only be
properly understood in terms of context and expectations. Helen Nissenbaum (Fall 2011),
“A contextual approach to privacy online,”
Daedalus
11, http://www.amacad.org/publications/daedalus/11_fall_nissenbaum.pdf. Alexis C.
Madrigal (29 Mar 2012), “The philosopher whose fingerprints are all over the FTC’s
new approach to privacy,”
Atlantic
, http://www.theatlantic.com/technology/print/2012/03/the-philosopher-whose-fingerprints-are-all-over-the-ftcs-new-approach-to-privacy/254365.

They’re different in the US:
This means there will always be some regional differences in the Internet, although
its international nature necessitates more homogeneity.

Lawyers look up potential jurors:
Sarah Grider Cronan and Neal F. Bailen (5 Apr 2007), “‘Should I Google the jury?’
and other ethical considerations,” Section of Litigation, American Bar Association,
http://apps.americanbar.org/litigation/committees/products/articles/0407_cronan.html.

people look up each other:
Samantha Henig (Mar 2013), “Why you should stop Googling your dates,”
Glamour
, http://www.glamour.com/sex-love-life/2013/03/why-you-should-stop-googling-your-dates.
This video shows how creepy this sort of thing can get. Mario Contreras (29 May 2014),
“Meet in a public place,”
Vimeo
, http://vimeo.com/96870066.

Google stalking:
Andrea Bartz and Brenna Ehrlich (7 Dec 2011), “The dos and don’ts of Googling people,”
CNN, http://www.cnn.com/2011/12/07/tech/social-media/netiquette-google-stalking.

Julian Assange’s old OKCupid:
Joe Coscarelli (12 Dec 2010), “Does Julian Assange have a profile on OKCupid?”
Village Voice
, http://blogs.villagevoice.com/runninscared/2010/12/does_julian_ass.php.

Revenge porn . . . is an extreme example:
Economist (5 Jun 2014), “Misery merchants,”
Economist
, http://www.economist.com/news/international/21606307-how-should-online-publication-explicit-images-without-their-subjects-consent-be.

Mug shot extortion sites:
David Kravets (15 Jul 2013), “Mugshot-removal sites accused of extortion,”
Wired
, http://www.wired.com/2013/07/mugshot-removal-extortion. David Segal (6 Oct 2013),
“Mugged by a mug shot online,”
New York Times
, http://www.nytimes.com/2013/10/06/business/mugged-by-a-mug-shot-online.html.

This is essentially the point of:
David Brin (1998),
The Transparent Society: Will Technology Force Us to Choose between Privacy and Freedom?
Basic Books, http://www.davidbrin.com/transparentsociety1.html.

Clay Shirky pointed out:
Emily Nussbaum (12 Feb 2007), “Say everything,”
New York Magazine
, http://nymag.com/news/features/27341.

grow up with more surveillance:
Jessy Irwin (7 Oct 2014), “Grooming students for a lifetime of surveillance,”
Model View Culture
, http://modelviewculture.com/pieces/grooming-students-for-a-lifetime-of-surveillance.

schools with ID checks:
Some schools are requiring students to wear electronic badges: the same technology
that farmers use with livestock. Associated Press (11 Oct 2010), “Houston-area schools
tracking students with radio frequency badges,”
Dallas Morning News
, http://www.dallasnews.com/news/education/headlines/20101011-Houston-area-schools-tracking-students-with-6953.ece.

Privacy is recognized as a fundamental right:
United Nations (10 Dec 1948), “The Universal Declaration of Human Rights,” http://www.un.org/en/documents/udhr.

European Convention on Human Rights:
The convention was revised in 2010.
European Court of Human Rights (1 Jun 2010), “European Convention of Human Rights,”
Council of Europe, http://www.echr.coe.int/documents/convention_eng.pdf.

It’s in the US Constitution:
Doug Linder (2014), “Exploring constitutional conflicts: The right of privacy,” University
of Missouri, Kansas City, http://law2.umkc.edu/faculty/projects/ftrials/conlaw/rightofprivacy.html.

It’s part of the 2000 Charter:
European Union (18 Dec 2
000
), “Charter of Fundamental Rights of the European Union,” http://ec.europa.eu/justice/fundamental-rights/charter/index_en.htm.

the UN General Assembly approved:
The document reaffirms “the human right to privacy, according to which no one shall
be subjected to arbitrary or unlawful interference with his or her privacy, family,
home or correspondence, and the right to the protection of the law against such interference,
and recognizing that the exercise of the right to privacy is important for the realization
of the right to freedom of expression and to hold opinions without interference, and
is one of the foundations of a democratic society.” United Nations General Assembly
(21 Jan 2014), “Resolution adopted by the General Assembly on 18 December 2013, 68/167,
The right to privacy in the digital age,” http://www.un.org/ga/search/view_doc.asp?symbol=A/RES/68/167.

Charter of Fundamental Rights:
The charter was declared in 2
000
, but didn’t have full force of law until it was ratified as part of the Treaty of
Lisbon in 2009. European Union (18 Dec 2
000
), “Charter of Fundamental Rights of the European Union,” http://ec.europa.eu/justice/fundamental-rights/charter/index_en.htm.

privacy is not something to be traded:
Benjamin Franklin said, “Those who would give up essential Liberty, to purchase a
little temporary Safety, deserve neither Liberty nor Safety.”

There’s an opportunity for real change:
Marcia Stepanek (8 Aug 2013), “The Snowden effect: An opportunity?”
Stanford Social Innovation Review
, http://www.ssireview.org/blog/entry/the_snowden_effect_an_opportunity.

Rahm Emanuel said:
Gerald F. Seib (21 Nov 2008), “In crisis, opportunity for Obama,”
Wall Street Journal
, http://online.wsj.com/news/articles/SB122721278056345271.

group interest against self-interest:
Bruce Schneier (2012),
Liars and Outliers: Enabling the Trust That Society Needs to Thrive
, Wiley, http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118143302.html.

humanity will benefit:
Charles Safran et al. (Jan/Feb 2007), “Toward a national framework for the secondary
use of health data: An American Medical Informatics Association white paper,”
Journal of the American Medical Informatics Association
14, https://www.sciencedirect.com/science/article/pii/S106750270600212X. Peter B.
Jensen, Lars J. Jensen, and Søren Brunak (Jun 2012), “Mining electronic health records:
Towards better research applications and clinical care,”
Nature Reviews: Genetics
13, http://www.dartmouth.edu/~cbbc/courses/bio270/PDFs-13S/Tim_Byounggug.pdf.

analyzes the study habits:
Reynol Junco (2014),
Engaging Students through Social Media: Evidence Based Practices for Use in Student
Affairs
, Wiley/Jossey-Bass, http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118647459.html.

OKCupid has been experimenting:
Christian Rudder (28 Jul 2014), “We experiment on human
beings!”
OK Trends
, http://blog.okcupid.com/index.php/we-experiment-on-human-beings. Christian Rudder
(4 Sep 2014), “When websites peek into private lives,”
Wall Street Journal
, http://online.wsj.com/articles/when-websites-peek-into-private-lives-1409851575.

it’s hard to justify:
Mark Weinstein (2 Sep 2014), “OKCupid, that’s OKStupid,”
Huffington Post
, http://www.huffingtonpost.com/mark-weinstein/okcupid-thats-okstupid_b_5739812.html.

value in our collective data:
US Executive Office of the President (2013), “Digital government: Building a 21st
century platform to better serve the American people,” http://www.whitehouse.gov/sites/default/files/omb/egov/digital-government/digital-government.html.
Microsoft Corporation (27 Mar 2013), “State and local governments adopt Microsoft
Dynamics CRM to improve citizen service delivery,”
Microsoft News Center
, http://www.microsoft.com/en-us/news/press/2013/mar13/03-27dynamicscrmpr.aspx.

we need to get involved:
The UK’s GCHQ explicitly fears this debate. One of the Snowden documents repeatedly
talks about avoiding a “damaging public debate” about the extent of surveillance.
James Ball (25 Oct 2013), “Leaked memos reveal GCHQ efforts to keep mass surveillance
secret,”
Guardian
, http://www.theguardian.com/uk-news/2013/oct/25/leaked-memos-gchq-mass-surveillance-secret-snowden.

I often turn to a statement:
It is actually his paraphrase of an older statement by the abolitionist Theodore
Parker, from 1853: “I do not pretend to understand the moral universe, the arc is
a long one, my eye reaches but little ways. I cannot calculate the curve and complete
the figure by experience of sight; I can divine it by conscience. But from what I
see I am sure it bends towards justice.” garson (15 Nov 2012), “The arc of the moral
universe is long but it bends toward justice,”
Quote Investigator
, http://quoteinvestigator.com/2012/11/15/arc-of-universe.

INDEX

Page numbers listed correspond to the print edition of this book. You can use your
device’s search function to locate particular terms in the text.

Page numbers beginning with 243 refer to notes.

Abdulmutallab, Umar Farouk, 136, 139

accountability:

corporate surveillance and, 193–95, 196–97, 202

government surveillance and, 161–63, 168

Accretive Health, 108

Acxiom, 41, 52

AdBlock Plus, 56

Adobe, 60

advertising, personalized, 5, 53–56, 233, 269

by Amazon, 51

by Apple, 50–51

creepiness factor in, 54–55

data brokers and,
see
data broker industry

data mining and, 33, 34, 38

declining value of, 55–56

in Gmail, 129–30, 142–43

Internet surveillance and, 47, 48–51, 206

location data and, 39–40

as over-hyped, 54

in political campaigns, 54, 115–16

ubiquitous surveillance and, 53, 233

AdWords, 54

Afghanistan, 26

Afghanistan War, 65

airline tickets:

frequent flyer programs and, 219

pricing of, 109–10

airplane security, 93, 158

Alexander, Keith, 80, 138, 139, 220, 339

al Qaeda, 63

Amazon, 28, 59

as information middleman, 57

personalized advertising by, 51

Amdocs, 182

amicus briefs, 209

Amirahmadi, Hooshang, 103

Android phones, 58

Angry Birds, location data tracked by, 48

anonymity:

data mining and, 42–45

inadequate protection of, 44–45

Internet and, 43–44, 131–33, 263–64

right to, 318

value of, 133–34

Anonymous (hacker group), 42–43

AOL, 43

Apple, 59–60, 221

customer loyalty to, 58

government demands for data from, 208, 354

iTunes store of, 57

personalized advertising and, 50–51

Wi-Fi password database of, 31

appliances, smart, 15–16

Applied Cryptography
(Schneier), 119

Ardis, Jim, 101

Area SpA, 81

Army, US, recruiting ads of, 110–11

Arnbak, Axel, 179

Assange, Julian, 231

AT&T, 120, 122

Australia, in international intelligence partnerships, 76

automobile companies, GPS data collected by, 29–30

automobile insurance, usage-based pricing of, 112

automobiles, black box recorders in, 14

autonomy, right to, 318

Awad, Nihad, 103

backdoors, 86, 120–21, 123, 147–48, 169, 182, 314

Baker, Stewart, 23

banks, data mining by, 137

base rate fallacy, 323–24

Bates, John, 172, 337

behavior:

anomalous, 39

data mining and, 38–40

Benkler, Yochai, 99, 341–42

Bentham, Jeremy, 32, 97

Beria, Lavrentiy, 92

Bermuda, NSA recording of all phone conversations in, 36

Berners-Lee, Tim, 210

Bill of Rights, 210

Bing, paid search results on, 113

Binney, Bill, 250, 274, 305

biometric data, 16, 211

BitLocker, 148, 215

Blue Coat, 82

Bluetooth IDs, 29

BND (German Intelligence), 77

BNP Paribas, 35–36

Booz Allen Hamilton, 80

Other books

Dance With Me by Heidi Cullinan
Never Any End to Paris by Enrique Vila-Matas
Dead by Midnight by Beverly Barton
Murder on the Prowl by Rita Mae Brown
Phantom Limb by Dennis Palumbo
The Outlaws: Jess by Connie Mason