Data and Goliath (52 page)

Read Data and Goliath Online

Authors: Bruce Schneier

BOOK: Data and Goliath
13.37Mb size Format: txt, pdf, ePub

other political protesters:
American Civil Liberties Union (29 Jun 2010), “Policing free speech: Police surveillance
and obstruction of First Amendment-protected activity,” https://www.aclu.org/files/assets/Spyfiles_2_0.pdf.
Linda E. Fisher (2004), “Guilt by
expressive association: Political profiling, surveillance and the privacy of groups,”
Arizona Law Review
46, http://www.arizonalawreview.org/pdf/46-4/46arizlrev621.pdf. US Department of
Justice (Sep 2010), “A review of the FBI’s investigations of certain domestic advocacy
groups,” http://www.justice.gov/oig/special/s1009r.pdf.

The NSA and FBI spied:
Glenn Greenwald and Murtaza Hussain (9 Jul 2014), “Under surveillance: Meet the Muslim-American
leaders the FBI and NSA have been spying on,”
Intercept
, https://firstlook.org/theintercept/article/2014/07/09/under-surveillance.

The New York Police Department:
Associated Press (2012), “Highlights of AP’s Pulitzer Prize-winning probe into NYPD
intelligence operations,” Associated Press, http://www.ap.org/media-center/nypd/investigation,
and http://www.ap.org/Index/AP-In-The-News/NYPD.

Boston’s fusion center spied:
Kade Crockford (25 May 2014), “Documents show Boston’s ‘antiterrorism’ fusion center
obsessively documented Occupy Boston,” Privacy SOS, http://privacysos.org/node/1417.
Carol Rose and Kade Crockford (30 May 2014), “When police spy on free speech, democracy
suffers,”
Cognoscenti
, http://cognoscenti.wbur.org/2014/05/30/boston-regional-intelligence-center-carol-rose-kade-crockford.

the city teamed with IBM:
Luke O’Neil (13 Aug 2014), “Beantown’s Big Brother: How Boston police used facial
recognition technology to spy on thousands of music festival attendees,”
Noisey
, http://noisey.vice.com/blog/beantowns-big-brother.

Pentagon’s Counterintelligence Field Activity:
Lisa Myers, Douglas Pasternak, and Rich Gardella (14 Dec 2005), “Is the Pentagon
spying on Americans?”
NBC News
, http://www.nbcnews.com/id/10454316/ns/nbc_nightly_news_with_brian_williams-nbc_news_investigates/t/pentagon-spying-americans.
Marcy Wheeler (24 Jul 2007), “Cunningham, CIFA, and Cheney, a new chronology,”
Empty Wheel
, http://www.emptywheel.net/2007/07/24/cunningham-cifa-and-cheney-a-new-chronology.

collecting data on the porn-viewing habits:
Glenn Greenwald, Ryan Grim, and Ryan Gallagher (26 Nov 2013), “Top-secret document
reveals NSA spied on porn habits as part of plan to discredit ‘radicalizers,’”
Huffington Post
, http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html.

fake Facebook page:
Chris Hamby (6 Oct 2014), “Government set up a fake Facebook page in a woman’s name,”
Buzzfeed
, http://www.buzzfeed.com/chrishamby/government-says-federal-agents-can-impersonate-woman-online.

School administrators installed spyware:
William Bender (23 Feb 2010), “Lawyer: L. Merion is mum on number of webcam pictures,”
Philadelphia Inquirer
, http://articles.philly.com/2010-02-23/news/24957453_1_webcam-laptops-students.

This turned out to be a dead end:
Eric Lichtblau and James Risen (23 Jun 2006), “Bank data is sifted by U.S. in secret
to block terror,”
New York Times
, http://www.nytimes.com/2006/06/23/washington/23intel.html. Loek Essers (3 Jul 2014),
“EU court orders more transparency over US-EU terrorist finance tracking program,”
PC World
, http://www.pcworld.com/article/2450760/eu-court-orders-more-transparency-over-useu-terrorist-finance-tracking-program.html.
Monika Ermert (23 Oct 2013), “European Parliament: No more bank data transfers to
US for anti-terror investigations,”
Intellectual Property Watch
, http://www.ip-watch.org/2013/10/23/european-parliament-no-more-bank-data-transfers-to-us-for-anti-terror-investigations.

far more commonly used:
ACLU (7 Mar 2002), “How the USA-Patriot Act expands
law enforcement “sneak and peek” warrants,” https://www.aclu.org/technology-and-liberty/how-usa-patriot-act-expands-law-enforcement-sneak-and-peek-warrants.
Trevor Timm (26 Oct 2011), “Ten years after the Patriot Act, a look at the three most
dangerous provisions affecting ordinary Americans,”
Electronic Frontier Foundation
, https://www.eff.org/deeplinks/2011/10/ten-years-later-look-three-scariest-provisions-usa-patriot-act.

surveillance against drug smugglers:
The NSA has been sharing information with the DEA since the 1970s. James Bamford
(2008),
The Shadow Factory: The Ultra-Secret NSA from 9/11 to Eavesdropping on America
, Doubleday, http://books.google.com/books?id=8zJmxWNTxrwC.

DEA staff were instructed:
John Shiffman and Kristina Cooke (5 Aug 2013), “U.S. directs agents to cover up program
used to investigate Americans,” Reuters, http://www.reuters.com/article/2013/08/05/us-dea-sod-idUSBRE97409R20130805.
Hanni Fakhoury (6 Aug 2013), “DEA and NSA team up to share intelligence, leading to
secret use of surveillance in ordinary investigations,” Electronic Frontier Foundation,
https://www.eff.org/deeplinks/2013/08/dea-and-nsa-team-intelligence-laundering. John
Shiffman and David Ingram (7 Aug 2013), “IRS manual detailed DEA’s use of hidden intel
evidence,” Reuters, http://www.reuters.com/article/2013/08/07/us-dea-irs-idUSBRE9761AZ20130807.

NSA’s term is:
NSA whistleblower Bill Binney described it thus: “. . . when you can’t use the data,
you have to go out and do a parallel construction, [which] means you use what you
would normally consider to be investigative techniques, [and] go find the data. You
have a little hint, though. NSA is telling you where the data is . . . .” Alexa O’Brien
(30 Sep 2014), “Retired NSA technical director explains Snowden docs,”
Second Sight
, http://www.alexaobrien.com/secondsight/wb/binney.html.

Dread Pirate Roberts:
Brian Krebs (14 Oct 2014), “Silk Road lawyers poke holes in FBI’s story,”
Krebs on Security
, http://krebsonsecurity.com/2014/10/silk-road-lawyers-poke-holes-in-fbis-story.

surveillance intended to nab terrorists:
Rob Evans and Paul Lewis (26 Oct 2009), “Police forces challenged over files held
on law-abiding protesters,”
Guardian
, http://www.theguardian.com/uk/2009/oct/26/police-challenged-protest-files.

all sorts of minor criminal cases:
Gordon Rayner and Richard Alleyne (12 Apr 2008), “Council spy cases hit 1,
000
a month,”
Telegraph
, http://www.telegraph.co.uk/news/uknews/1584808/Council-spy-cases-hit-1
000
-a-month.html. Sarah Lyall (24 Oct 2009), “Britons weary of surveillance in minor
cases,”
New York Times
, http://www.nytimes.com/2009/10/25/world/europe/25surveillance.html.

Israel, for instance:
James Bamford (16 Sep 2014), “Israel’s NSA scandal,”
New York Times
, http://www.nytimes.com/2014/09/17/opinion/israels-nsa-scandal.html.

A system that is overwhelmingly powerful:
This essay makes that point. Daniel Davies (23 Sep 2014), “Every single IT guy, every
single manager . . . ,”
Crooked Timber
, http://crookedtimber.org/2014/09/23/every-single-it-guy-every-single-manager.

Hillary Clinton gave a speech:
Hillary Rodham Clinton (21 Jan 2010), “Internet freedom,”
Foreign Policy
, http://www.foreignpolicy.com/articles/2010/01/21/internet_freedom.

US State Department funds:
US Department of State (2014), “Internet freedom,” http://www.state.gov/e/eb/cip/netfreedom/index.htm.

one of the defenses:
British Broadcasting Corporation (2 Jun 2014), “‘We are being watched’
say Egyptians on social media,”
BBC News
, http://www.bbc.com/news/blogs-trending-27665568.

Indians are worried:
Jayshree Bajoria (5 Jun 2014), “India’s snooping and Snowden,”
India Real Time
, http://blogs.wsj.com/indiarealtime/2014/06/05/indias-snooping-and-snowden.

Both China and Russia:
Shannon Tiezzi (28 Mar 2014), “China decries US ‘hypocrisy’ on cyber-espionage,”
Diplomat
, http://thediplomat.com/2014/03/china-decries-us-hypocrisy-on-cyber-espionage. Xinhua
News Agency (11 Jul 2014), “Putin calls US surveillance practice ‘utter hypocrisy,’”
China Daily
, http://www.chinadaily.com.cn/world/2014-07/11/content_17735783.htm.

Facebook’s Mark Zuckerberg:
Mark Zuckerberg (13 Mar 2014), “As the world becomes more complex . . . ,”
Facebook
, https://www.facebook.com/zuck/posts/10101301165605491.

8: Commercial Fairness and Equality

Accretive Health is:
Office of the Minnesota Attorney General (19 Jan 2012), “Attorney General Swanson
sues Accretive Health for patient privacy violations,” Office of the Minnesota Attorney
General, http://www.ag.state.mn.us/Consumer/PressRelease/120119AccretiveHealth.asp.

settled a Minnesota lawsuit:
Tony Kennedy and Maura Lerner (31 Jul 2012), “Accretive is banned from Minnesota,”
Star-Tribune
, http://www.startribune.com/lifestyle/health/164313776.html.

companies use surveillance data:
Kate Crawford and Jason Schultz (2014), “Big data and due process: Toward a framework
to redress predictive privacy harms,”
Boston College Law Review
55, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2325784.

“Redlining” is a term:
Marc Hochstein (26 Jun 2
000
), “Wells kills web link after Acorn sues,”
American Banker
, http://www.americanbanker.com/issues/165_119/-128168-1.html. Gary A. Hernandez,
Katherine J. Eddy, and Joel Muchmore (Fall 2001), “Insurance weblining and unfair
discrimination in cyberspace,”
Southern Methodist University Law Review
54, http://heinonline.org/HOL/LandingPage?collection=journals&handle=hein.journals/smulr54&div=91.

easier to do on the Internet:
Bill Davidow (5 Mar 2014), “Redlining for the 21st century,”
Atlantic
, http://www.theatlantic.com/business/archive/2014/03/redlining-for-the-21st-century/284235.

Wells Fargo bank created:
Michael Liedtke (22 Jun 2
000
), “Lawsuit alleges Wells Fargo uses Internet to promote discrimination,”
Los Angeles Times
, http://articles.latimes.com/2
000
/jun/22/business/fi-43532. Ronna Abramson (23 Jun 2
000
), “Wells Fargo accused of ‘redlining’ on the Net,”
Computer World
, http://www.computerworld.com/article/2596352/financial-it/wells-fargo-accused-of--redlining--on-the-net.html.

This practice is called weblining:
Marcia Stepanek (3 Apr 2
000
), “Weblining,”
Bloomberg Businessweek
, http://www.businessweek.com/2
000
/00_14/b3675027.htm. Casey Johnston (10 Oct 2013), “Denied for that loan? Soon you
may thank online data collection,”
Ars Technica
, http://arstechnica.com/business/2013/10/denied-for-that-loan-soon-you-may-thank-online-data-collection.

report on big data concluded:
US Executive Office of the President (1 May 2014), “Big data: Seizing opportunities,
preserving values,” http://www.whitehouse.gov/sites/default/files/docs/big_data_privacy_report_may_1_2014.pdf.

Uber’s surge pricing:
Uber had to modify its pricing so as not to run afoul of New York State’s prohibitions
against price-gouging during emergencies. Mike Isaac (8 Jul 2014), “Uber reaches deal
with New York on surge pricing in emergencies,”
New York Times
, http://bits.blogs.nytimes.com/2014/07/08/uber-reaches-agreement-with-n-y-on-surge-pricing-during-emergencies.
Peter Himler (12 Aug 2014), “UBER: So cool, yet so uncool,”
Forbes
, http://www.forbes.com/sites/peterhimler/2014/08/12/uber-so-cool-but-so-uncool.

different prices and options:
Jennifer Valentino-DeVries, Jeremy Singer-Vine, and Ashkan Soltani (24 Dec 2012),
“Websites vary prices, deals based on users’ information,”
Wall Street Journal
, http://online.wsj.com/news/articles/SB1
000
1424127887323777204578189391813881534. Michael Schrage (29 Jan 2014), “Big data’s
dangerous new era of discrimination,”
Harvard Business Review
, http://blogs.hbr.org/2014/01/big-datas-dangerous-new-era-of-discrimination.

Depending on who you are:
Emily Steele and Julia Angwin (4 Aug 2010), “On the Web’s cutting edge, anonymity
in name only,”
Wall Street Journal
, http://online.wsj.com/news/articles/SB1
000
1424052748703294904575385532109190198.

other companies . . . are also adjusting prices:
Jennifer Valentino-DeVries, Jeremy Singer-Vine, and Ashkan Soltani (24 Dec 2012),
“Websites vary prices, deals based on users’ information,”
Wall Street Journal
, http://online.wsj.com/news/articles/SB1
000
1424127887323777204578189391813881534.

we all have a customer score:
Pam Dixon and Robert Gellman (2 Apr 2014), “The scoring of America: How secret consumer
scores threaten your privacy and your future,” World Privacy Forum, http://www.worldprivacyforum.org/wp-content/uploads/2014/04/WPF_Scoring_of_America_April2014_fs.pdf.

a series of recruiting ads:
Jessica E. Vascellaro (7 Mar 2011), “TV’s next wave: Tuning in to you,”
Wall Street Journal
, http://online.wsj.com/articles/SB1
000
1424052748704288304576171251689944350.

Orbitz highlighted different prices:
Dana Mattioli (23 Aug 2012), “On Orbitz, Mac users steered to pricier hotels,”
Wall Street Journal
, http://online.wsj.com/news/articles/SB1
000
1424052702304458604577488822667325882.

Other books

Ted & Me by Dan Gutman
Dangerous Waters by Juliet E. McKenna
Firethorn by Sarah Micklem
Run to Me by Christy Reece
Caleb by Alverson, Charles
Shaken Up by Alex Morgan
Ghostwriting by Eric Brown
Tough Luck Hero by Maisey Yates