Monday, December 7, 2015

Monday 12-07-15



Life in the Electronic Concentration Camp: The Surveillance State Is Alive and Well


                         
 John W. Whitehead
November 30, 2015

“Big Brother in the form of an increasingly powerful government and in an increasingly powerful private sector will pile the records high with reasons why privacy should give way to national security, to law and order [...] and the like.” ― William O. Douglas, Supreme Court Justice
Bottle up the champagne, pack away the noisemakers, and toss out the party hats.
There is no cause for celebration.
We have secured no major victories against tyranny.
We have achieved no great feat in pushing back against government overreach.
For all intents and purposes, the National Security Agency has supposedly ceased its bulk collection of metadata from Americans’ phone calls, but read the fine print: nothing is going to change.
The USA Freedom Act, which claimed to put an end to the National Security Agency’s controversial collection of metadata from Americans’ phone calls, was just a placebo pill intended to make us feel better and let the politicians take credit for reforming mass surveillance.
In other words, it was a sham, a sleight-of-hand political gag pulled on a gullible public desperate to believe that we still live in a constitutional republic rather than a down-and-out, out-of-control, corporate-controlled, economically impoverished, corrupt, warring, militarized banana republic.
You cannot restrain the NSA. The beast has outgrown its chains.
You cannot reform the NSA. A government that lies, cheats, steals, sidesteps the law, and then absolves itself of wrongdoing does not voluntarily alter its behavior.
You cannot put an end to the NSA’s “technotyranny.” Presidents, politicians, and court rulings have come and gone over the course of the NSA’s 60-year history, but none of them have managed to shut down the government’s secret surveillance of Americans’ phone calls, emails, text messages, transactions, communications and activities.
Indeed, the government has become an expert in finding ways to sidestep niggling, inconvenient laws aimed at ensuring accountability, bringing about government transparency and protecting citizen privacy.
It has mastered the art of stealth maneuvers and end-runs around the Constitution.
It knows all too well how to hide its nefarious, covert, clandestine activities behind the classified language of national security and terrorism. And when that doesn’t suffice, it obfuscates, complicates, stymies or just plain bamboozles the public into remaining in the dark.
Case in point: the so-called end of the NSA’s metadata collection of Americans’ phone calls.
This, of course, is no end at all.
On any given day, the average American going about his daily business will still be monitored, surveilled, spied on and tracked in more than 20 different ways, by both government and corporate eyes and ears.
More than a year before politicians attempted to patch up our mortally wounded privacy rights with the legislative bandaid fix that is the USA Freedom Act, researchers at Harvard and Boston University documented secret loopholes that allow the government to bypass Fourth Amendment protections to conduct massive domestic surveillance on U.S. citizens.
It’s extraordinary rendition all over again, only this time it’s surveillance instead of torture being outsourced.
In much the same way that the government moved its torture programs overseas in order to bypass legal prohibitions against doing so on American soil, it is doing the same thing for its surveillance programs. By shifting its data storage, collection and surveillance activities outside of the country, the government is able to bypass constitutional protections against unwarranted searches of Americans’ emails, documents, social networking data, and other cloud-stored data.
Heck, the government doesn’t even need to move all of its programs overseas. It just has to push the data over the border in order to “[circumvent] constitutional and statutory safeguards seeking to protect the privacy of Americans.”
Credit for this particular brainchild goes to the Obama administration, which issued Executive Order 12333 authorizing the collection of Americans’ data from surveillance conducted on foreign soil.
Using this rationale, the government was able to justify hacking into and collecting an estimated 180 million user records from Google and Yahoo data centers every month because the data travels over international fiber-optic cables. The NSA program, dubbed MUSCULAR, is carried out in concert with British intelligence.
No wonder the NSA appeared so unfazed about being forced to shut down its much-publicized metadata program. It had already figured out a way to accomplish the same results (illegally spying on Americans’ communications) without being shackled by the legislative or judicial branches of the government.
Mind you, this metadata collection now being carried out overseas is just a small piece of the surveillance pie. The government and its corporate partners have a veritable arsenal of surveillance programs that will continue to operate largely in secret, carrying out warrantless mass surveillance on hundreds of millions of Americans’ phone calls, emails, text messages and the like, beyond the scrutiny of most of Congress and the taxpayers who are forced to fund its multi-billion dollar secret black ops budget.
The surveillance state is alive and well and kicking privacy to shreds in America.
Whether you’re walking through a store, driving your car, checking email, or talking to friends and family on the phone, you can be sure that some government agency, whether the NSA or some other entity, will still be listening in and tracking your behavior. This doesn’t even begin to touch on the corporate trackers that monitor your purchases, web browsing, Facebook posts and other activities taking place in the cyber sphere.
We are now in a state of transition with the police state shifting into high-gear under the auspices of the surveillance state.
Having already transformed local police into extensions of the military, the Department of Homeland Security, the Justice Department and the FBI are preparing to turn the nation’s police officers into techno-warriors, complete with iris scanners, body scanners, thermal imaging Doppler radar devices, facial recognition programs, license plate readers, cell phone Stingray devices and so much more.
Add in the fusion centers, city-wide surveillance networks, data clouds conveniently hosted overseas by Amazon and Microsoft, drones equipped with thermal imaging cameras, and biometric databases, and you’ve got the makings of a world in which “privacy” is reserved exclusively for government agencies.
Thus, telephone surveillance by the NSA is the least of our worries.
Even with restrictions on its ability to collect mass quantities of telephone metadata, the government and its various spy agencies, from the NSA to the FBI, can still employ an endless number of methods for carrying out warrantless surveillance on Americans, all of which are far more invasive than the bulk collection program.
As I point out in my new book Battlefield America: The War on the American People, just about every branch of the government—from the Postal Service to the Treasury Department and every agency in between—now has its own surveillance sector, authorized to spy on the American people.
Then there are the fusion and counterterrorism centers that gather all of the data from the smaller government spies—the police, public health officials, transportation, etc.—and make it accessible for all those in power.
And of course that doesn’t even begin to touch on the complicity of the corporate sector, which buys and sells us from cradle to grave, until we have no more data left to mine. Indeed, Facebook, Amazon and Google are among the government’s closest competitors when it comes to carrying out surveillance on Americans, monitoring the content of your emails, tracking your purchases and exploiting your social media posts.
“Few consumers understand what data are being shared, with whom, or how the information is being used,” reports the Los Angeles Times. “Most Americans emit a stream of personal digital exhaust — what they search for, what they buy, who they communicate with, where they are — that is captured and exploited in a largely unregulated fashion.”
It’s not just what we say, where we go and what we buy that is being tracked.
We’re being surveilled right down to our genes, thanks to a potent combination of hardware, software and data collection that scans our biometrics—our faces, irises, voices, genetics, even our gait—runs them through computer programs that can break the data down into unique “identifiers,” and then offers them up to the government and its corporate allies for their respective uses.
All of those internet-connected gadgets we just have to have (Forbes refers to them as “(data) pipelines to our intimate bodily processes”)—the smart watches that can monitor our blood pressure and the smart phones that let us pay for purchases with our fingerprints and iris scans—are setting us up for a brave new world where there is nowhere to run and nowhere to hide.
For instance, imagine what the NSA could do (and is likely already doing) with voiceprint technology, which has been likened to a fingerprint. Described as “the next frontline in the battle against overweening public surveillance,” the collection of voiceprints is a booming industry for governments and businesses alike. As The Guardian reports, “voice biometrics could be used to pinpoint the location of individuals. There is already discussion about placing voice sensors in public spaces, and [Lee Tien, senior staff attorney with the Electronic Frontier Foundation] said that multiple sensors could be triangulated to identify individuals and specify their location within very small areas.”
Suddenly the NSA’s telephone metadata program seems like child’s play compared to what’s coming down the pike.
That, of course, is the point.
The NSA is merely one small part of a shadowy permanent government comprised of unelected bureaucrats who march in lockstep with profit-driven corporations that actually runs Washington, DC, and works to keep us under surveillance and, thus, under control. For example, Google openly works with the NSA, Amazon has built a massive $600 million intelligence database for CIA, and the telecommunications industry is making a fat profit by spying on us for the government.
In other words, Corporate America is making a hefty profit by aiding and abetting the government in its domestic surveillance efforts.
At every turn, we have been handicapped in our quest for transparency, accountability and a representative democracy by an establishment culture of secrecy: secret agencies, secret experiments, secret military bases, secret surveillance, secret budgets, and secret court rulings, all of which exist beyond our reach, operate outside our knowledge, and do not answer to “we the people.”
Now there are still those who insist that they have nothing to hide from the surveillance state and nothing to fear from the police state because they have done nothing wrong.
To those sanctimonious few, secure in their delusions, let this be a warning: the danger posed by the American police state applies equally to all of us—lawbreaker and law abider alike, black and white, rich and poor, liberal and conservative, blue collar and white collar, and any other distinction you’d care to trot out.
In an age of too many laws, too many prisons, too many government spies, and too many corporations eager to make a fast buck at the expense of the American taxpayer, there is no safe place and no watertight alibi. We are all guilty of some transgression or other, and eventually, we will all be made to suffer the same consequences in the electronic concentration camp that surrounds us.

https://www.rutherford.org/publications_resources/john_whiteheads_commentary/life_in_the_electronic_concentration_camp_the_surveillance_state_is_al

Can’t Put Down Your Device? That’s by Design

Greg Hochmuth was one of the first software engineers hired at Instagram. He worked on a team in 2012 that developed the first Android app for the slick photo-sharing service. In its first 24 hours, the app was downloaded more than one million times.
 
But Mr. Hochmuth eventually came to realize that the platform’s pleasing features — the interface that made it easy for people to upload and share beautiful images, the personalized suggestions of accounts to follow — also had potential downsides.
The same design qualities that make an app enthralling, he said, may also make it difficult for people to put down. And the more popular such services become, the more appeal they hold for users — a phenomenon known as the network effect.
“Once people come in, then the network effect kicks in and there’s an overload of content. People click around. There’s always another hashtag to click on,” Mr. Hochmuth, who left Instagram last year and started his own data consulting firm in Manhattan, told me recently. “Then it takes on its own life, like an organism, and people can become obsessive.”
Photo
“Network Effect” explores the psychological implications of popular digital services and features 10,000 clips of people engaging in various activities.
Now Mr. Hochmuth and Jonathan Harris, an artist and computer scientist, have collaborated on a project that explores the implications of such compelling digital platforms for the human psyche. Titled “Network Effect,” the site invites users to click through a video and audio smorgasbord of human behavior. It includes 10,000 clips of people primping, eating, kissing, blinking and so on.
Unlike delectable cooking apps or engrossing music streaming apps that may elicit pleasure responses in the brain, however, the voyeuristic site is deliberately disjointed and discomfiting. To challenge the idea that people entirely exercise free will during their online sessions, the site also automatically turns itself off after a few minutes, shutting out users for 24 hours.
“The endpoint makes you reflect,” Mr. Hochmuth said. “Do I want to keep browsing and clicking and being obsessed? Or do I want to do something else?”
As the site underscores, digital life keeps us hooked with an infinite entertainment stream as its default setting. Tech companies often set it up that way.
There’s Facebook beckoning with its bottomless news feed. There’s Netflix autoplaying the next episode in a TV series 10 seconds after the previous one ends. There’s Tinder encouraging us to keep swiping in search of the next potential paramour.
And then there are the constant notices and reminders — a friend liked your photo or tweet; a colleague wants to connect with you on LinkedIn; an Evite awaits your response — which automatically induce feelings of social obligation. You damn yourself to distraction if you respond, and to fear of missing out if you don’t.
Tech companies tend to present these feedback loops as consumer conveniences. A new Intel TV ad, for instance, shows a young girl in the back of a car growing sad because the laptop on which she was watching a singalong video suddenly runs out of power. The company’s new battery-preserving processor, though, ultimately saves the day, “so you never have to stop watching.” T-Mobile has just introduced BingeOn, a feature that offers subscribers on certain plans unlimited high-speed access to popular streaming video channels.
Photo
An image from “Network Effect.”
There’s even an industry term for the experts who continually test and tweak apps and sites to better hook consumers, keep them coming back and persuade them to stay longer: growth hackers.
“How do you drive habitual use of a product?” said Sean Ellis, the chief executive of GrowthHackers.com, a software company specializing in online growth techniques. “It’s not just about getting new people. It’s about retaining the people you already have and, ultimately, getting them to bring in more people.”
As an example, Mr. Ellis described how he recently started using a free meditation app, called Calm, which has a calendar feature that gently nudges subscribers to use the service more. Every time he finishes a session, the app “shows me I’m doing one every three to four days,” Mr. Ellis said. “But it’s clear to me that I should be doing one every day, based on the graphic.”
Yet technologists like Tristan Harris, a design ethicist who is also a product philosopher at Google, warn that growth hacking, taken to its extreme, can encourage sites and apps to escalate their use of persuasive design techniques with potentially unintended consequences for consumers. He compares online engagement maximization efforts to the so-called bliss-point techniques some food companies have developed to hook consumers on a stew of fat, salt and sugar.
“The ‘I don’t have enough willpower’ conversation misses the fact that there are 1,000 people on the other side of the screen whose job is to break down the self-regulation that you have,” said Mr. Harris, who emphasized that he was speaking only for himself and not for Google.
Mr. Harris is also the co-director of an effort called Time Well Spent, which encourages tech companies to provide more choices for users who would like to limit session-prolonging techniques like autoplaying one video or song after another. He said he envisioned alternative app designs that might measure success not in followers, connections, endorsements or likes accumulated, but in meaningful relationships developed or desired jobs offered.
“Right now, many company leaders and designers would like to do these things differently, but the incentives aren’t aligned to do this,” Mr. Harris said.
Photo
The “Network Effect” invites users to click through a video and audio smorgasbord of human behavior.
Certainly, it may be difficult for efforts like Time Well Spent and art projects like “Network Effect” to sway companies that find themselves in increasingly heated competition for online users’ attention.
Mr. Ellis, the chief of GrowthHackers, said that the biggest sites and apps “can have ethical conversations about good attention and bad attention.” For many other online platforms, he said, “ethical or not, not aspiring to drive engagement and attention means you are likely to go out of business.”
Still, companies may eventually find a profit motive in monitoring and inhibiting Internet addiction.
In Canada, for instance, casinos have tried developing computer algorithms to identify slot machine players whose behavior is clearly becoming addictive and then intervene, said Natasha Dow Schüll, an associate professor in the department of media, culture and communication at New York University, who has studied gambling design. Ethics aside, she said, it’s a way for companies to maintain profits — by not draining their customer base.
Social networks and online game companies have even more detailed data on how much time people spend on their sites and how often they click, she said.
“It makes sense that companies should do something about it, not just to be good corporate citizens, but to protect profits.  Professor Schüll said. “We need to have a conversation about how to respond to this — they could send alerts or allow people to set their own thresholds on time.”
Mr. Hochmuth, the co-author of the “Network Effect” project, said he was hopeful that market forces would eventually inspire sites and apps to explore more varied designs and user interfaces.
“I think something will actually change — the question is where will change come from?” he said, noting that the organic food movement started with small producers, not the mass-produced food industry. Online services that give users more options and control, he concluded, “may not come from the incumbent players.”

http://www.nytimes.com/2015/12/06/technology/personaltech/cant-put-down-your-device-thats-by-design.html?_r=0

No comments:

Post a Comment