Read Data and Goliath Online

Authors: Bruce Schneier

Data and Goliath (52 page)

BOOK: Data and Goliath
3.23Mb size Format: txt, pdf, ePub
ads

other political protesters:
American Civil Liberties Union (29 Jun 2010), “Policing free speech: Police surveillance
and obstruction of First Amendment-protected activity,” https://www.aclu.org/files/assets/Spyfiles_2_0.pdf.
Linda E. Fisher (2004), “Guilt by
expressive association: Political profiling, surveillance and the privacy of groups,”
Arizona Law Review
46, http://www.arizonalawreview.org/pdf/46-4/46arizlrev621.pdf. US Department of
Justice (Sep 2010), “A review of the FBI’s investigations of certain domestic advocacy
groups,” http://www.justice.gov/oig/special/s1009r.pdf.

The NSA and FBI spied:
Glenn Greenwald and Murtaza Hussain (9 Jul 2014), “Under surveillance: Meet the Muslim-American
leaders the FBI and NSA have been spying on,”
Intercept
, https://firstlook.org/theintercept/article/2014/07/09/under-surveillance.

The New York Police Department:
Associated Press (2012), “Highlights of AP’s Pulitzer Prize-winning probe into NYPD
intelligence operations,” Associated Press, http://www.ap.org/media-center/nypd/investigation,
and http://www.ap.org/Index/AP-In-The-News/NYPD.

Boston’s fusion center spied:
Kade Crockford (25 May 2014), “Documents show Boston’s ‘antiterrorism’ fusion center
obsessively documented Occupy Boston,” Privacy SOS, http://privacysos.org/node/1417.
Carol Rose and Kade Crockford (30 May 2014), “When police spy on free speech, democracy
suffers,”
Cognoscenti
, http://cognoscenti.wbur.org/2014/05/30/boston-regional-intelligence-center-carol-rose-kade-crockford.

the city teamed with IBM:
Luke O’Neil (13 Aug 2014), “Beantown’s Big Brother: How Boston police used facial
recognition technology to spy on thousands of music festival attendees,”
Noisey
, http://noisey.vice.com/blog/beantowns-big-brother.

Pentagon’s Counterintelligence Field Activity:
Lisa Myers, Douglas Pasternak, and Rich Gardella (14 Dec 2005), “Is the Pentagon
spying on Americans?”
NBC News
, http://www.nbcnews.com/id/10454316/ns/nbc_nightly_news_with_brian_williams-nbc_news_investigates/t/pentagon-spying-americans.
Marcy Wheeler (24 Jul 2007), “Cunningham, CIFA, and Cheney, a new chronology,”
Empty Wheel
, http://www.emptywheel.net/2007/07/24/cunningham-cifa-and-cheney-a-new-chronology.

collecting data on the porn-viewing habits:
Glenn Greenwald, Ryan Grim, and Ryan Gallagher (26 Nov 2013), “Top-secret document
reveals NSA spied on porn habits as part of plan to discredit ‘radicalizers,’”
Huffington Post
, http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html.

fake Facebook page:
Chris Hamby (6 Oct 2014), “Government set up a fake Facebook page in a woman’s name,”
Buzzfeed
, http://www.buzzfeed.com/chrishamby/government-says-federal-agents-can-impersonate-woman-online.

School administrators installed spyware:
William Bender (23 Feb 2010), “Lawyer: L. Merion is mum on number of webcam pictures,”
Philadelphia Inquirer
, http://articles.philly.com/2010-02-23/news/24957453_1_webcam-laptops-students.

This turned out to be a dead end:
Eric Lichtblau and James Risen (23 Jun 2006), “Bank data is sifted by U.S. in secret
to block terror,”
New York Times
, http://www.nytimes.com/2006/06/23/washington/23intel.html. Loek Essers (3 Jul 2014),
“EU court orders more transparency over US-EU terrorist finance tracking program,”
PC World
, http://www.pcworld.com/article/2450760/eu-court-orders-more-transparency-over-useu-terrorist-finance-tracking-program.html.
Monika Ermert (23 Oct 2013), “European Parliament: No more bank data transfers to
US for anti-terror investigations,”
Intellectual Property Watch
, http://www.ip-watch.org/2013/10/23/european-parliament-no-more-bank-data-transfers-to-us-for-anti-terror-investigations.

far more commonly used:
ACLU (7 Mar 2002), “How the USA-Patriot Act expands
law enforcement “sneak and peek” warrants,” https://www.aclu.org/technology-and-liberty/how-usa-patriot-act-expands-law-enforcement-sneak-and-peek-warrants.
Trevor Timm (26 Oct 2011), “Ten years after the Patriot Act, a look at the three most
dangerous provisions affecting ordinary Americans,”
Electronic Frontier Foundation
, https://www.eff.org/deeplinks/2011/10/ten-years-later-look-three-scariest-provisions-usa-patriot-act.

surveillance against drug smugglers:
The NSA has been sharing information with the DEA since the 1970s. James Bamford
(2008),
The Shadow Factory: The Ultra-Secret NSA from 9/11 to Eavesdropping on America
, Doubleday, http://books.google.com/books?id=8zJmxWNTxrwC.

DEA staff were instructed:
John Shiffman and Kristina Cooke (5 Aug 2013), “U.S. directs agents to cover up program
used to investigate Americans,” Reuters, http://www.reuters.com/article/2013/08/05/us-dea-sod-idUSBRE97409R20130805.
Hanni Fakhoury (6 Aug 2013), “DEA and NSA team up to share intelligence, leading to
secret use of surveillance in ordinary investigations,” Electronic Frontier Foundation,
https://www.eff.org/deeplinks/2013/08/dea-and-nsa-team-intelligence-laundering. John
Shiffman and David Ingram (7 Aug 2013), “IRS manual detailed DEA’s use of hidden intel
evidence,” Reuters, http://www.reuters.com/article/2013/08/07/us-dea-irs-idUSBRE9761AZ20130807.

NSA’s term is:
NSA whistleblower Bill Binney described it thus: “. . . when you can’t use the data,
you have to go out and do a parallel construction, [which] means you use what you
would normally consider to be investigative techniques, [and] go find the data. You
have a little hint, though. NSA is telling you where the data is . . . .” Alexa O’Brien
(30 Sep 2014), “Retired NSA technical director explains Snowden docs,”
Second Sight
, http://www.alexaobrien.com/secondsight/wb/binney.html.

Dread Pirate Roberts:
Brian Krebs (14 Oct 2014), “Silk Road lawyers poke holes in FBI’s story,”
Krebs on Security
, http://krebsonsecurity.com/2014/10/silk-road-lawyers-poke-holes-in-fbis-story.

surveillance intended to nab terrorists:
Rob Evans and Paul Lewis (26 Oct 2009), “Police forces challenged over files held
on law-abiding protesters,”
Guardian
, http://www.theguardian.com/uk/2009/oct/26/police-challenged-protest-files.

all sorts of minor criminal cases:
Gordon Rayner and Richard Alleyne (12 Apr 2008), “Council spy cases hit 1,
000
a month,”
Telegraph
, http://www.telegraph.co.uk/news/uknews/1584808/Council-spy-cases-hit-1
000
-a-month.html. Sarah Lyall (24 Oct 2009), “Britons weary of surveillance in minor
cases,”
New York Times
, http://www.nytimes.com/2009/10/25/world/europe/25surveillance.html.

Israel, for instance:
James Bamford (16 Sep 2014), “Israel’s NSA scandal,”
New York Times
, http://www.nytimes.com/2014/09/17/opinion/israels-nsa-scandal.html.

A system that is overwhelmingly powerful:
This essay makes that point. Daniel Davies (23 Sep 2014), “Every single IT guy, every
single manager . . . ,”
Crooked Timber
, http://crookedtimber.org/2014/09/23/every-single-it-guy-every-single-manager.

Hillary Clinton gave a speech:
Hillary Rodham Clinton (21 Jan 2010), “Internet freedom,”
Foreign Policy
, http://www.foreignpolicy.com/articles/2010/01/21/internet_freedom.

US State Department funds:
US Department of State (2014), “Internet freedom,” http://www.state.gov/e/eb/cip/netfreedom/index.htm.

one of the defenses:
British Broadcasting Corporation (2 Jun 2014), “‘We are being watched’
say Egyptians on social media,”
BBC News
, http://www.bbc.com/news/blogs-trending-27665568.

Indians are worried:
Jayshree Bajoria (5 Jun 2014), “India’s snooping and Snowden,”
India Real Time
, http://blogs.wsj.com/indiarealtime/2014/06/05/indias-snooping-and-snowden.

Both China and Russia:
Shannon Tiezzi (28 Mar 2014), “China decries US ‘hypocrisy’ on cyber-espionage,”
Diplomat
, http://thediplomat.com/2014/03/china-decries-us-hypocrisy-on-cyber-espionage. Xinhua
News Agency (11 Jul 2014), “Putin calls US surveillance practice ‘utter hypocrisy,’”
China Daily
, http://www.chinadaily.com.cn/world/2014-07/11/content_17735783.htm.

Facebook’s Mark Zuckerberg:
Mark Zuckerberg (13 Mar 2014), “As the world becomes more complex . . . ,”
Facebook
, https://www.facebook.com/zuck/posts/10101301165605491.

8: Commercial Fairness and Equality

Accretive Health is:
Office of the Minnesota Attorney General (19 Jan 2012), “Attorney General Swanson
sues Accretive Health for patient privacy violations,” Office of the Minnesota Attorney
General, http://www.ag.state.mn.us/Consumer/PressRelease/120119AccretiveHealth.asp.

settled a Minnesota lawsuit:
Tony Kennedy and Maura Lerner (31 Jul 2012), “Accretive is banned from Minnesota,”
Star-Tribune
, http://www.startribune.com/lifestyle/health/164313776.html.

companies use surveillance data:
Kate Crawford and Jason Schultz (2014), “Big data and due process: Toward a framework
to redress predictive privacy harms,”
Boston College Law Review
55, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2325784.

“Redlining” is a term:
Marc Hochstein (26 Jun 2
000
), “Wells kills web link after Acorn sues,”
American Banker
, http://www.americanbanker.com/issues/165_119/-128168-1.html. Gary A. Hernandez,
Katherine J. Eddy, and Joel Muchmore (Fall 2001), “Insurance weblining and unfair
discrimination in cyberspace,”
Southern Methodist University Law Review
54, http://heinonline.org/HOL/LandingPage?collection=journals&handle=hein.journals/smulr54&div=91.

easier to do on the Internet:
Bill Davidow (5 Mar 2014), “Redlining for the 21st century,”
Atlantic
, http://www.theatlantic.com/business/archive/2014/03/redlining-for-the-21st-century/284235.

Wells Fargo bank created:
Michael Liedtke (22 Jun 2
000
), “Lawsuit alleges Wells Fargo uses Internet to promote discrimination,”
Los Angeles Times
, http://articles.latimes.com/2
000
/jun/22/business/fi-43532. Ronna Abramson (23 Jun 2
000
), “Wells Fargo accused of ‘redlining’ on the Net,”
Computer World
, http://www.computerworld.com/article/2596352/financial-it/wells-fargo-accused-of--redlining--on-the-net.html.

This practice is called weblining:
Marcia Stepanek (3 Apr 2
000
), “Weblining,”
Bloomberg Businessweek
, http://www.businessweek.com/2
000
/00_14/b3675027.htm. Casey Johnston (10 Oct 2013), “Denied for that loan? Soon you
may thank online data collection,”
Ars Technica
, http://arstechnica.com/business/2013/10/denied-for-that-loan-soon-you-may-thank-online-data-collection.

report on big data concluded:
US Executive Office of the President (1 May 2014), “Big data: Seizing opportunities,
preserving values,” http://www.whitehouse.gov/sites/default/files/docs/big_data_privacy_report_may_1_2014.pdf.

Uber’s surge pricing:
Uber had to modify its pricing so as not to run afoul of New York State’s prohibitions
against price-gouging during emergencies. Mike Isaac (8 Jul 2014), “Uber reaches deal
with New York on surge pricing in emergencies,”
New York Times
, http://bits.blogs.nytimes.com/2014/07/08/uber-reaches-agreement-with-n-y-on-surge-pricing-during-emergencies.
Peter Himler (12 Aug 2014), “UBER: So cool, yet so uncool,”
Forbes
, http://www.forbes.com/sites/peterhimler/2014/08/12/uber-so-cool-but-so-uncool.

different prices and options:
Jennifer Valentino-DeVries, Jeremy Singer-Vine, and Ashkan Soltani (24 Dec 2012),
“Websites vary prices, deals based on users’ information,”
Wall Street Journal
, http://online.wsj.com/news/articles/SB1
000
1424127887323777204578189391813881534. Michael Schrage (29 Jan 2014), “Big data’s
dangerous new era of discrimination,”
Harvard Business Review
, http://blogs.hbr.org/2014/01/big-datas-dangerous-new-era-of-discrimination.

Depending on who you are:
Emily Steele and Julia Angwin (4 Aug 2010), “On the Web’s cutting edge, anonymity
in name only,”
Wall Street Journal
, http://online.wsj.com/news/articles/SB1
000
1424052748703294904575385532109190198.

other companies . . . are also adjusting prices:
Jennifer Valentino-DeVries, Jeremy Singer-Vine, and Ashkan Soltani (24 Dec 2012),
“Websites vary prices, deals based on users’ information,”
Wall Street Journal
, http://online.wsj.com/news/articles/SB1
000
1424127887323777204578189391813881534.

we all have a customer score:
Pam Dixon and Robert Gellman (2 Apr 2014), “The scoring of America: How secret consumer
scores threaten your privacy and your future,” World Privacy Forum, http://www.worldprivacyforum.org/wp-content/uploads/2014/04/WPF_Scoring_of_America_April2014_fs.pdf.

a series of recruiting ads:
Jessica E. Vascellaro (7 Mar 2011), “TV’s next wave: Tuning in to you,”
Wall Street Journal
, http://online.wsj.com/articles/SB1
000
1424052748704288304576171251689944350.

Orbitz highlighted different prices:
Dana Mattioli (23 Aug 2012), “On Orbitz, Mac users steered to pricier hotels,”
Wall Street Journal
, http://online.wsj.com/news/articles/SB1
000
1424052702304458604577488822667325882.

BOOK: Data and Goliath
3.23Mb size Format: txt, pdf, ePub
ads

Other books

The Heaven I Swallowed by Rachel Hennessy
Chains of Destruction by Selina Rosen
Enslaved by Ducks by Bob Tarte
The Marriage Merger by Sandy Curtis
Liar by Gosse, Joanna
Last Screw Before I Do by Manda McNay