Mass surveillance
From Wikipedia, the free encyclopedia
Mass surveillance is the pervasive surveillance of an entire population, or a substantial fraction thereof.
Modern governments today commonly perform mass surveillance of their citizens, explaining that they believe that it is necessary to protect them from dangerous groups such as terrorists, criminals, or political subversives and to maintain social control.
Mass surveillance has been widely criticized on several grounds such as violations of privacy rights, illegality, and for preventing political and social freedoms, which some fear will ultimately lead to a totalitarian state where political dissent is crushed by COINTELPRO-like programs.
Contents |
[edit] State enforced
Privacy International's 2007 survey, covering 47 countries, indicated that there had been an increase in surveillance and a decline in the performance of privacy safeguards, compared to the previous year. Balancing these factors, eight countries were rated as being 'endemic surveillance societies'. Of these eight, China, Malaysia and Russia scored lowest, followed jointly by Singapore and the United Kingdom, then jointly by Taiwan, Thailand and the United States. The best ranking was given to Greece, which was judged to have 'adequate safeguards against abuse'.[1]
Many countries throughout the world have already been adding thousands of surveillance cameras to their urban, suburban and even rural areas.[2][3] For example, the American Civil Liberties Union have directly stated that "we are fast approaching a genuine surveillance society in the United States - a dark future where our every move, our every transaction, our every communication is recorded, compiled, and stored away, ready to be examined and used against us by the authorities whenever they want."[4]
[edit] United Kingdom
The United Kingdom is seen as a pioneer of mass surveillance. At the end of 2006 it was described by the Surveillance Studies Network as being 'the most surveilled country' among the industrialized Western states.[5]
On 6 February 2009 a report by the House of Lords Constitution Committee, Surveillance: Citizens and the State,[6] warned that increasing use of surveillance by the government and private companies is a serious threat to freedoms and constitutional rights, stating that "The expansion in the use of surveillance represents one of the most significant changes in the life of the nation since the end of the Second World War. Mass surveillance has the potential to erode privacy. As privacy is an essential pre-requisite to the exercise of individual freedom, its erosion weakens the constitutional foundations on which democracy and good governance have traditionally been based in this country."[7]
[edit] Public perception
A YouGov poll published on December 4, 2006, indicated that 79% of those interviewed agreed that Britain has become a 'surveillance society’ (51% were unhappy with this).[8] In 2004 the Information Commissioner, talking about the proposed British national identity database gave a warning of this, stating, "My anxiety is that we don't sleepwalk into a surveillance society."[9] Other databases causing him concern were the National Child Database (ContactPoint), the Office for National Statistics' Citizen Information Project, and the NHS National Programme for IT.
[edit] CCTV networks
In 2002[update] it was estimated[10] that the United Kingdom was monitored by over 4.2 million CCTV cameras, some with a facial recognition capacity, with practically all town centres under surveillance. Serious concerns have been raised[who?] that the facial biometric information which will be stored on a central database through the national identity card scheme could be linked to facial recognition systems and state-owned CCTV cameras to identify individuals anywhere in the UK, or even to compile a database of citizens' movements without their knowledge or consent. Currently, in the City of Westminster, microphones are being fitted next to CCTV cameras. Westminster council claims that they are simply part of an initiative against urban noise, and will not "be used to snoop", but comments from a council spokesman appear to imply that they have been deliberately designed to capture an audio stream alongside the video stream, rather than simply reporting noise levels.[11]
[edit] Public transport
In London, the Oyster card payment system can track the movement of individual people through the public transport system, although an anonymous option is available, while the London congestion charge uses computer imaging to track car number plates.
[edit] Communication
In 2008 plans were being made to collect data on all phone calls, emails, chatroom discussions and web-browsing habits as part of the Government's Interception Modernisation Programme, thought likely to require the insertion of 'thousands' of black box probes into the country’s computer and telephone networks.[12] The proposals were expected to be included in the Communications Data Bill. The "giant database" would include telephone numbers dialed, the websites visited and addresses to which e-mails are sent "but not the content of e-mails or telephone conversations."[13] Chris Huhne, Home affairs spokesman said: "The government's Orwellian plans for a vast database of our private communications are deeply worrying."[14]
Since October 2007 telecommunication companies have been required to keep records of phone calls and text messages for twelve months under the Data Retention Directive[15] Though all telecoms firms already keep data for a period, the regulations are designed to ensure a uniform approach across the industry.[16] This enables the Government and other selected authorities within the UK such as Police and Councils amongst others to monitor all phone calls made from a UK landline or Mobile upon request.
In the period 11 April to 31 December 2006 the UK gov issued 253,557 requests for communication data, which as defined by the RIPA includes who you phoned, when they phoned you, how long they phoned you for, subscriber information and associated addresses.[17]
In 2002 the UK government announced plans to extend the Regulation of Investigatory Powers Act, so that at least 28 government departments would be given powers to browse citizens' web, email, telephone and fax records, without a warrant and without a subject's knowledge. Public and security authorities made a total of 440,000 requests to monitor people's phone and internet use in 2005-2006.
[edit] Mobile phone tracking
Customers in shopping centres are being tracked by private companies. Utilising mobile phone signals, a system can tell when people enter the centre, how long they stay in a particular shop, and what route each customer takes. The system works by monitoring the signals produced by mobile handsets and then locating the phone by triangulation.[18]
[edit] Vehicle tracking
Across the country efforts are increasingly under way to track closely all road vehicle movements, initially using a nationwide network of roadside cameras connected to automatic number plate recognition systems. In the longer term mandatory onboard vehicle telematics systems are also suggested, to facilitate road charging (see vehicle excise duty).
[edit] DNA Database
The British Police hold records of 5.5 million fingerprints and over 3.4 million DNA samples on the National DNA Database. There is increasing use of roadside fingerprinting - using new police powers to check identity. Concerns have been raised over the unregulated use of biometrics in schools, affecting children as young as three.
[edit] Overseas travel
In February 2009 it emerged that the government is planning a database to track and store records of all international travel into and out of the UK. The database will retain record of names, addresses, telephone numbers, seat reservations, travel itineraries and credit card details, which will be kept for 'no more than 10 years'.[19]
[edit] United States
[edit] Internet Communications
The Communications Assistance for Law Enforcement Act (CALEA) requires that all U.S. telecommunications companies modify their equipment to allow easy wiretapping of telephone, VoIP, and broadband internet traffic.[20][21][22]
Billions of dollars per year are spent, by agencies such as the Information Awareness Office, NSA, and the FBI, to develop, purchase, implement, and operate systems such as Carnivore, ECHELON, and NarusInsight to intercept and analyze the immense amount of data thats traverse the Internet and telephone system every day. [23]
The Total Information Awareness program, of the Information Awareness Office, designed numerous technologies to be used to perform mass surveillance. Examples include advanced speech-to-text programs (so that phone conversations can be monitored en-masse by a computer, instead of requiring human operators to listen to them), social network analysis software to monitor groups of people and their interactions with each other, and "Human identification at a distance" software which allows computers to identify people on surveillance cameras by their facial features and gait (the way they walk). The program was later renamed "Terrorism Information Awareness", after a negative public reaction.
The Electronic Frontier Foundation has an ongoing lawsuit (Hepting v. AT&T) against the telecom giant AT&T for its assistance of the U.S. government in monitoring the communications of millions of American citizens. It has managed thusfar to keep the proceedings open. Recently the documents, exposed by a whistleblower who previously worked for AT&T, showing schematics of the massive data mining system were made public.[24][25]
The FBI developed the computer programs "Magic Lantern" and CIPAV, which they can remotely install on a computer system, in order to monitor a person's computer activity. [26]
In 1999 two models of mandatory data retention were suggested for the US: What IP address was assigned to a customer at a specific time. In the second model, "which is closer to what Europe adopted", telephone numbers dialed, contents of Web pages visited, and recipients of e-mail messages must be retained by the ISP for an unspecified amount of time.[27][28]
The Internet Stopping Adults Facilitating the Exploitation of Today's Youth (SAFETY) Act of 2009 also known as H.R. 1076 and S.436 would require providers of "electronic communication or remote computing services" to "retain for a period of at least two years all records or other information pertaining to the identity of a user of a temporarily assigned network address the service assigns to that user."[29]
[edit] Telephones
In early 2006, USA Today reported that several major telephone companies were cooperating illegally with the National Security Agency to monitor the phone records of U.S. citizens, and storing them in a large database known as the NSA call database. This report came on the heels of allegations that the U.S. government had been conducting electronic surveillance of domestic telephone calls without warrants.[30]
Law enforcement and intelligence services in the United States possess technology to remotely activate the microphones in cell phones in order to listen to conversations that take place nearby the person who holds the phone.[31][32]
U.S. federal agents regularly use mobile phones to collect location data. The geographical location of a mobile phone (and thus the person carrying it) can be determined easily (whether it is being used or not), using a technique known multilateration to calculate the differences in time for a signal to travel from the cell phone to each of several cell towers near the owner of the phone. [33][34]
[edit] Surveillance Cameras
Traffic cameras, which were meant to help enforce traffic laws at intersections, have also sparked some controversy, due to their use by law enforcement agencies for purposes unrelated to traffic violations.[35]
The Department of Homeland Security is funding networks of surveillance cameras in cities and towns as part of its efforts to combat terrorism.[36] In February 2009, Cambridge, MA rejected the cameras due to privacy concerns.[37]
[edit] Data Mining
The NSA has been gathering information on financial records, internet surfing habits, and monitoring e-mails. They have also performed extensive surveillance on social networks such as Myspace.[38]
The FBI collected nearly all hotel, airline, rental car, gift shop, and casino records in Las Vegas during the last two weeks of 2003. The FBI requested all electronic data of hundreds of thousands of people based on a very general lead for the Las Vegas New Year's celebration. The Senior VP of The Mirage went on record with PBS' Frontline describing the first time they were requested to help in the mass collection of personal information.[39]
[edit] Infiltration of Activist Groups
The NYPD infiltrated and compiled dossiers on protest groups (most of whom were doing nothing illegal) before the 2004 Republican National Convention, leading to over 1,800 arrests and subsequent fingerprinting.[40]
[edit] Recruitment of Stasi-like Neighborhood Snitch Network
After 9/11, the Bush administration proposed the TIPS program [41]which was strongly opposed and eventually blocked by Congress,[[4]] yet most of its proposals were instituted anyway by individual agencies and programs including USAonWatch, CitizenCorps, Highway Watch and others, encouraging its individual groups to report and log any "suspicious activity" either lawful or unlawful, or individuals "who don't belong". [42] It is believed the number of citizens now reporting such trivial and lawful activities to the government now reaches the hundreds of thousands. [43]
[edit] European Union
The legislative body of the European Union passed the Data Retention Directive on 2005-12-15. It requires telecommunication operators to implement mass surveillance of the general public through retention of metadata on telecommunications and to keep the collected data at the disposal of various governmental bodies for substantially long times. Access to this information is not required to be limited to investigation of serious crimes, nor is a warrant required for access.
[edit] Russia
The SORM (and SORM-2) laws enable complete monitoring of any communication, electronic or traditional, by eight state agencies, without warrant.
[edit] Germany & Netherlands
The Netherlands and Germany are reputed to have the highest levels of covert governmental mobile phone tapping. The article on telephone tapping states:
- "There were proposals for European mobile phones to use stronger encryption, but this was opposed by a number of European countries, including the Netherlands and Germany, which are among the world's most prolific telephone tappers (over 10000+ phone numbers in both countries in 2003)."
In 2002 German citizens were tipped off about the scale of tapping, when a software error led to a phone number allocated to the German Secret Service being listed on mobile telephone bills.[44]
[edit] East Germany
Before the Digital Revolution, one of the world's biggest mass surveillance operations was carried out by the Stasi, the secret police of the former East Germany. By the time the state collapsed in 1989, the Stasi had built up an estimated civilian network of 300,000 informants (approximately one in fifty of the population), who monitored even minute hints of political dissent among other citizens. Many West Germans visiting friends and family in East Germany were also subject to Stasi spying, as well as many high-ranking West German politicians and persons in the public eye.
Most East German citizens were well aware that their government was spying on them, which led to a culture of mistrust: touchy political issues were only discussed in the comfort of their own four walls and only with the closest of friends and family members, while widely maintaining a façade of unquestioning followership in public.
[edit] Commercial mass surveillance
As a result of the digital revolution, many aspects of life are now captured and stored in digital form. Concern has been expressed that governments may use this information to conduct mass surveillance on their populations.
One of the most common forms of mass surveillance is carried out by commercial organizations. Many people are willing to join supermarket and grocery loyalty card programs, trading their personal information and surveillance of their shopping habits in exchange for a discount on their groceries, although base prices might be increased to encourage participation in the program. Since a significant proportion of purchases are carried out by credit or debit cards, which can also be easily tracked, it is questionable whether loyalty cards provide any significant additional privacy threat.
[edit] Literature and movies
[edit] Critical of mass surveillance
- Nineteen Eighty-Four, a novel by George Orwell depicting life under an omnipresent totalitarian state, and is probably the most prominent of the media listed; the 'Big Brother' who watches over the novel's characters is now used to describe any form of spying on or interfering with the public, such as CCTV cameras.
- We, a little-known 1920 novel by Russian author Yevgeny Zamyatin, that predates Nineteen Eighty-Four and was read by its author George Orwell.
- The Transparent Society by David Brin, discusses various scenarios for the future considering the spread of cheap web-cameras, increases in government security initiatives, and the possible death of encryption if quantum computing becomes reality.
- The Minority Report, a story by Philip K. Dick about a society that arrests people for crimes they have yet to commit (made into a movie in 2002).
- THX 1138, a 1971 film by George Lucas depicting life in an underground dystopia where all human activities are monitored centrally at all times. A high level of control is exerted upon the populace through ever-present faceless, android police officers and mandatory, regulated use of special drugs to suppress emotion, including sexual desire. The film was first made as a student project in the University of Southern California and called Electronic Labyrinth: THX 1138 4EB.
- Oath of Fealty, a 1982 novel by Larry Niven and Jerry Pournelle describing a large arcology whose dwellers and visitors are constantly being of surveiled by a variety of technologies
- Blue Thunder, 1983 movie starring Roy Scheider
- Brazil, a film by Terry Gilliam depicting an oppressive total information awareness society
- Pizza, a short Flash video by ACLU depicting ordering pizza by phone in a Total Surveillance Society.
- Discipline and Punish by the critical theorist Michel Foucault is generally taken as being one of the paradigmatic works on theories of surveillance and discipline
- Enemy of the State, 1998 film about the use of surveillance and the powers it provides a corrupt politician who could track a person who has evidence of a politically motivated crime that would expose a murder.
- Equilibrium, 2002 film wherein a dystopic future society surviving the third world war takes an emotion-suppressing drug and where the general public is constantly watched by the government to make sure that no one breaks the equilibrium.
- The Conversation, 1974 movie starring Gene Hackman.
- "Welcome to the Machine: Science, Surveillance and the Culture of Control" by Social and Environmental philosopher, Derrick Jensen thoroughly examines the use of RFID chips, nanotechnology, military technology, science, and surveillance.
- The Listening, a 2006 movie in which a rogue NSA employee fights against the agency's Echelon system and one of its corporate partners.
- The Dark Knight, the 2008 summer blockbuster delved into whether the public security against the Joker's actions warranted Batman's mass scale spying on Gotham City's citizens using cell phone technology. Lucius Fox, Morgan Freeman's character, threatened to quit Wayne Enterprises over Batman's private surveillance of Gotham claiming that no one man should possess such power.[45]
- Eagle Eye, a 2008 movie which portrays how surveillance can go out of hand.
[edit] Praising mass surveillance
- The Light of Other Days is a science-fiction book that praises mass surveillance, under the condition that it is available to everyone. It shows a world in which a total lack of privacy results in a decrease in corruption and crime.
- Digital Fortress, novel by Dan Brown, involving an NSA codebreaking machine called 'TRANSLTR', reading and decrypting email messages, with which the NSA allegedly foiled terrorist attacks and mass murders.
[edit] See also
- Communications Assistance For Law Enforcement Act
- Criticisms of the War on Terrorism
- Carnivore, FBI US digital interception program
- Data privacy
- Data retention
- Government databases
- ECHELON
- Information Awareness Office
- Lawful interception
- Network analysis
- Narus: supplier of SIGINT system, NarusInsight, referred to in Hepting vs. AT&T
- National security
- NSA call database
- Pen register
- RFID tagging
- Right to privacy
- Security culture
- SIGINT
- Stellar wind (code name)
- Traffic analysis
- USA PATRIOT Act
- Telephone tapping in the Eastern Bloc
- Technologies of political control
[edit] External links
- Innovative use of google maps to plot Norwich City Council's entire CCTV network
- Tracks developments as the US and world speed toward a Big Brother society
- BBC: Is business the real Big Brother?
- The UK House of Commons Home Affairs Select Committee's report into ID cards
- Bigger databases...could also mean more unwelcome intervention
- Telegraph Online report: Council plans to listen in on street life
- Minnesota CriMNet Department of Public Safety Bureau of Criminal Apprehension databases
- Orwellian world news
- "Every Movement Scrutinized", Stirred Up Magazine
- Chicago Reader article about Police Surveillance and Murder
- Edward Higgs The Development of Central State Surveillance of the Citizen in England, 1500 - 2000
- Is the NSA reading your MySpace profile?
- Rfid in Euro and dollar
[edit] References
- ^ The 2007 International Privacy Ranking, Privacy International, published 2007-12-28
- ^ Police Surveillance: Go Snoop, Yourself - from http://www.zdnet.com, August 13, 2008.
- ^ YouGov/Daily Telegraph "Surveillance Society" Survey Results
- ^ American Civil Liberties Union - Surveillance Society] from [American Civil Liberties Union http://www.aclu.org], August 2008.
- ^ BBC News - Britain is 'surveillance society', 2 November 2006
- ^ Constitution Committee Reports, House of Lords Constitution Committee, published 2009-02-06, accessdate 2009-02-08
- ^ "Lords say surveillance society erodes foundations of UK". The Register. 2009-02-06. http://www.theregister.co.uk/2009/02/06/lords_reject_government_data/. Retrieved on 2009-02-08.
- ^ YouGov / Daily Telegraph Survey Results
- ^ BBC News - Watchdog's Big Brother UK warning, 16 August 2004
- ^ McCahill, M. and Norris, C. 2002. Urbaneye: CCTV in London
- ^ The Telegraph - Council plans to listen in on street life, 4 May 2005
- ^ "There’s no hiding place as spy HQ plans to see all". The Sunday Times. October 5, 2008. http://www.timesonline.co.uk/tol/news/uk/article4882622.ece. Retrieved on 2009-02-08.
- ^ "Concern over giant database idea". BBC. October 15, 2008. http://news.bbc.co.uk/2/hi/uk_news/politics/7671046.stm. Retrieved on 2008-10-15. "The government's terror watchdog has expressed concern about proposals for a giant database to store details of all phone calls, e-mails and internet use."
- ^ "Giant database plan 'Orwellian'". BBC. October 15, 2008. http://news.bbc.co.uk/2/hi/uk_news/politics/7671046.stm. Retrieved on 2008-10-17. "Lib Dem home affairs spokesman Chris Huhne said: "The government's Orwellian plans for a vast database of our private communications are deeply worrying." "I hope that this consultation is not just a sham exercise to soft-soap an unsuspecting public.""
- ^ "Government orders data retention by ISPs". The Register. 2008-05-16. http://www.theregister.co.uk/2008/05/16/isp_data_retention_directive/. Retrieved on 2008-10-17.
- ^ "UK phone records to be kept for a year". http://www.theregister.co.uk/2007/07/27/data_retention_law_passed/. Retrieved on 2007-10-04.
- ^ UK gov issued 250k phone tap licences in nine months
- ^ Shops secretly track customers via mobile phone
- ^ "The government is compiling a database to track and store the international travel records of millions of Britons.". The Guardian (The Press Association). 2009-02-08. http://www.guardian.co.uk/uk/feedarticle/8347931. Retrieved on 2008-02-08.
- ^ "CALEA Archive -- Electronic Frontier Foundation" (in English). Electronic Frontier Foundation (website). http://w2.eff.org/Privacy/Surveillance/CALEA/?f=archive.html. Retrieved on 2009-03-14.
- ^ "CALEA: The Perils of Wiretapping the Internet" (in English). Electronic Frontier Foundation (website). http://www.eff.org/issues/calea. Retrieved on 2009-03-14.
- ^ "CALEA: Frequently Asked Questions" (in English). Electronic Frontier Foundation (website). http://www.eff.org/pages/calea-faq. Retrieved on 2009-03-14.
- ^ McCullagh, Declan (January 30, 2007). "FBI turns to broad new wiretap method" (in English). ZDNet News. http://news.zdnet.com/2100-9595_22-151059.html. Retrieved on 2009-03-13.
- ^ Unsealed Klein exhibits | Electronic Frontier Foundation
- ^ Press Releases: June, 2007 | Electronic Frontier Foundation
- ^ "FBI's Secret Spyware Tracks Down Teen Who Made Bomb Threats". Wired Magazine. 2007-07-18. http://www.wired.com/politics/law/news/2007/07/fbi_spyware.
- ^ "ISP snooping gaining support". CNET. April 14, 2006. http://news.cnet.com/ISP-snooping-gaining-support/2100-1028_3-6061187.html. Retrieved on 2009-03-17.
- ^ "FBI, politicos renew push for ISP data retention laws". CNET. April 14, 2006. http://news.cnet.com/8301-13578_3-9926803-38.html. Retrieved on 2009-03-17. "Based on the statements at Wednesday's hearing and previous calls for new laws in this area, the scope of a mandatory data retention law remains fuzzy. It could mean forcing companies to store data for two years about what Internet addresses are assigned to which customers (Comcast said in 2006 that it would be retaining those records for six months)."
- ^ "Proposed Child Pornography Laws Raise Data Retention Concerns". ChannelWeb. February 20, 2009. http://www.crn.com/networking/214502232. Retrieved on 2009-03-17.
- ^ USATODAY.com - NSA has massive database of Americans' phone calls
- ^ McCullagh, Declan; Anne Broache (December 1, 2006). "FBI taps cell phone mic as eavesdropping tool" (in English). CNet News. http://news.cnet.com/FBI-taps-cell-phone-mic-as-eavesdropping-tool/2100-1029_3-6140191.html. Retrieved on 2009-03-14.
- ^ Odell, Mark (August 1, 2005). "Use of mobile helped police keep tabs on suspect" (in English). Financial Times. http://news.ft.com/cms/s/7166b8a2-02cb-11da-84e5-00000e2511c8.html. Retrieved on 2009-03-14.
- ^ "Tracking a suspect by mobile phone" (in English). BBC News. August 3, 2005. http://news.bbc.co.uk/1/hi/technology/4738219.stm. Retrieved on 2009-03-14.
- ^ Miller, Joshua (March 14, 2009). "Cell Phone Tracking Can Locate Terrorists - But Only Where It's Legal" (in English). FOX News. http://www.foxnews.com/story/0,2933,509211,00.html. Retrieved on 2009-03-14.
- ^ Caught! Big Brother May Be Watching You With Traffic Cameras
- ^ US doles out millions for street cameras
- ^ Cambridge rejects surveillance cameras
- ^ Is the NSA reading your MySpace profile? | Tech news blog - CNET News.com
- ^ FRONTLINE: spying on the home front: transcript | PBS
- ^ City Is Rebuffed on the Release of ’04 Records - New York Times
- ^ Bush proposes army of snitches[1]
- ^ the corbett report [2]
- ^ ACLU Surveillance report[3]
- ^ http://www.theregister.co.uk/2002/11/04/german_secret_service_taps_phones/
- ^ http://online.wsj.com/public/article_print/SB121694247343482821.html