The drone surge

The Huffington Post has a really interesting article on the current and future use of drones (whether they be UAVs, MAVs or other things) by the US military. Judging from the early comments, it seems there are some people also think these things are great because ‘they keep US soldiers safe’ – unfortunately they don’t seem to do the same for the villagers of the impoverished countries where they are deployed. As the International Campiagn for Robotic Arms Control (ICRAC) is arguing, there needs to be an international treaty or convention to regulate the use of such machines when they are used as or part of weapons systems, but beyond that, these systems, out of theline of vision of the general public, in terms of their policy development and often their physical deployment, are seen as ‘the future of surveillance’ within many nations too – as was revealed in Britain just the other day. The military-industrial complex is now the security-industrial complex and there is a decreasing gap between military tech and its civilian counterparts…

Security and the Economy (again)

The whole body scanners issue has once again brought to the fore the question of the relationship of security and the economy (see here, here and here). This is a more complex question than the political economy which argues that security companies benefit, therefore there are economic interests behind every surveillance surge than occurs. Of course, some companies, scanner makers, Rapiscan and L3 in particular in this case, make a lot of money form their patented systems: each one of the 44 L3 Scanners that Canadian airports are installing costs around $250,000 CAN (125,000 Euro), which adds up to a hefty income to L3. And of course there are connections to the revolving door of US Homeland Security governance at least: Michael Chertoff, the former Head of HOmeland Security from 2005-9 was making the case for scanners immediately after the December 25th thighbomber’s failed attempt, yet he neglected to mention his role as consultant to Rapiscan, which was awarded millions of dollars of contracts under his watch.

However, there are other interests here, notably the aviation industry, airlines and airports, not to mention those of travelers. The Toronto Globe and Mail today reports how airlines in Canada are increasingly concerned that already growing security levies from government (to provide security) will only spiral with every new measure introduced. The airlines expect the government to bear the costs. The government has merely said that it will try to ensure that costs passed on are minimised. However someone has to pay, somewhere along the line. If airlines (or their passengers) are not paying, then tax-payers are and it’s debatable whether ultimately, subsidising the security costs of international travelers is really what taxes should be for when times are hard. Of course no government wants this to come down to a ‘security versus the economy’ argument, but that has to be discussed, alongside the still largely unaddressed issues of privacy and other individual and collective liberties.

After the Thighbomber: Virtual Strip Searches at every airport?

The botched attempt to bomb a flight into the US by a the son of a wealthy Nigerian family, using explosive components strapped to his thigh, has led to an immediate techno-economic consequence, which is to speed up the process of installing terahertz wave or other body scanners in major airports, which if nothing else will provide a guaranteed income stream to Rapiscan and Qinetiq, who make these kinds of machines. Schipol in Amsterdam, where  announced they would be extending their body scanning operation and the British government almost immediately followed by saying that major British airports would be rolling out body scanning within weeks. Now, Canada is to do the same.

But, will this make a real difference or is it just more symbolic security? The scanners certainly ‘work’ in the sense that they do provide pretty good images of what is under the clothes of passengers (see below). However, interpreting what is seen is still no easy task and will the scanners will certainly not replace physical searches, but will add yet another extra layer of surveillant sorting and therefore delay. And there are questions over the effectiveness of the scanners in particular areas of the body. The Toronto Sun reports that trials at Kelowna Airport in British Columbia “left blind spots over the head and feet”, so these machines are certainly not the ‘silver bullet’.

Then of course, there are the privacy issues. I don’t have any particular problem with the technology, provided it is restricted to airports and doesn’t start to get used in other, more everyday, social settings (which given the rapid development of this technology is by no means certain). However, as I noted the last time I wrote about this, there will be many religious, gender-based and personal reasons for objecting to their use. The other question of course is whether, every time some lone lunatic tries something like this – that was, let us not forget, poorly planned and ineffective, and which should have been prevented by other conventional intelligence operations working properly – it makes sense to jump and harden security (or at least be seen to harden security) for everyone travelling internationally. Doing this just plays into the hands of terrorists as it disrupts the ordinary workings of an open society.

Body Scan Image (US TSA)

Iraqi resistance hacks US drones

According to the Wall Street Journal, US surveillance drones (you know, the future of military surveillance…) have allegedly been hacked by Iranian-backed Shi’ite forces in Iraq, using $26 off-the-shelf Russian software called Skygrabber – and they may have been compromised in Afghanistan too.

It is, as my informant, Aaron Martin, points out, amazing that the military surveillance systems of the world’s most resourced and technologically-developed military could be hacked so easily and for so long without notice. It also makes me wonder how many other networked surveillance systems would be vulnerable or are being hacked using the same or similar systems. If for example, organised criminal gangs could access the video surveillance systems of major cities, this would further call into question the effectiveness of these systems. Or alternatively, of course, it could point the way to a more accountable, open-access kind of surveillance – as Aaron and I are exploring in a paper we are currently writing.

Voluntary Self-Surveillance

In a nice bit of synchronicity with the ‘Surveillance and Empowerment’ call just issued by Surveillance & Society, there’s a really interesting little piece on the rise of ‘self-tracking’ by Curetogether founder, Alexandra Carmichael, in the latest issue of h+ magazine, an open-access publication from ‘transhumanist’ pioneer, R.U. Sirius.

The piece concentrates on those who have health problems who want to track and share symptoms and other biometric data, but argues that this is a wider interest: “we do it because we love data, or we do it because we have specific things we want to optimize about ourselves.”

There are also some useful links to life-logging and patient data-sharing sites.

(thanks to BoingBoing for the link to h+)

Where Will the Big Red Balloons Be Next?

The US Defence Advanced Research Projects Agency (DARPA) has launched a $40,000 competition ostensibly to see examine the way communication works in Web2.0. The competition will see whether disributed teams working together online can uncover the location of large red weather balloons moored across the USA.

The ‘DARPA Network Challenge’ “will explore the roles the Internet and social networking play in the timely communication, wide-area team-building, and urgent mobilization required to solve broad-scope, time-critical problems”.

All the headlines for this story have been verging on the amused (even The Guardian). Words like ‘whimsical’ and ‘wacky’ have been common. But it seems to me that this project has many underlying aims apart from those outlined in these superficial write-ups, not least of which are: how easily people in a culture of immediate gratification can be mobilised to state aims and in particular to do mundane intelligence and surveillance tasks (following the failure of simple old style rewards to work in the tracking down of Osama Bin Laden and other such problems), and 2, the prospects for manipulating ‘open-source intelligence’ in a more convenient manner, i.e. distributing military work and leveraging (a word the military loves) a new set of assets  – the online public, which is paradoxially characterised by both an often extreme scepticism and paranoia, but at the same time, a general superficiality and biddability.

DARPA, of course, was one of the originators of the Internet in the first place (as it continues to remind us), but the increasingly ‘open’ nature of emergent online cultures has meant that the US military now has a chronic anxiety about the security threats posed not so much by overt enemies as by the general loss of control – in fact, there’s been talk for a while of an ‘open-source insurgency’, a strategic notion that in one discursive twist elides terrorism and the open-source / open-access movement, and the CIA has recently bought into firms that specialize in Web 2.0 monitoring.

It seems rather reminiscent of both the post-WW2 remobilisation of US citizens in things like the 1950s ‘Skywatch’ programs (which Matt Farish from the University of Toronto has been studying) or more specifically, some of the brilliant novels of manipulation that emerged from that same climate, in particular Phillip K. Dick’s Time Out of Joint, in which unwitting dupe, Raggle Gumm, plots missile strikes for an oppressive government whilst thinking he’s winning a newspaper competition, ‘Where will the Little Green Man be Next?’

So, who’s going to be playing ‘Where Will the Big Red Balloons Be Next?’ then… ?

DARPA's Big Red Balloons (DARPA website)

US wiretapping information release

From Chris Parsons:

“Christopher Soghoian, a PhD Candidate at Indiana University, has released the information on US wiretap/pen register information along with documents received through FOIA that are inquiring into the costs that telecommunications carriers demand for the two aforementioned services. He also has full recordings of sessions from (the closed door) ISS World: Intelligence Support Systems for Lawful Interception, Criminal Investigations and Intelligence Gathering. An executive summary of his draft thoughts are below, followed by a link to the full piece he’s written. He has made available his recordings and the responses to his FOIA requests to the public at large, all accessible at the link below.

Executive Summary

Sprint Nextel provided law enforcement agencies with its customers’ (GPS) location information over 8 million times between September 2008 and October 2009. This massive disclosure of sensitive customer information was made possible due to the roll-out by Sprint of a new, special web portal for law enforcement officers.

The evidence documenting this surveillance program comes in the form of an audio recording of Sprint’s Manager of Electronic Surveillance, who described it during a panel discussion at awiretapping and interception industry conference, held in Washington DC in October of 2009.

It is unclear if Federal law enforcement agencies’ extensive collection of geolocation data should have been disclosed to Congress pursuant to a 1999 law that requires the publication of certain surveillance statistics — since the Department of Justice simply ignores the law, and has not provided the legally mandated reports to Congress since 2004.”


The Biggest Database in the World

James Bamford has a superb review of the new book by Matthew Aid about the US National Security Agency (NSA) in the New York Review of Books this month. What seems to be causing a stir around the intelligence research (and computing) community is the reference to a report by the MITRE corporation into a the information needs of the NSA in relation to new central NSA data repository being constructed in the deserts of Utah. The report, which is being rather speculative, says that IF the trend for increasing numbers of sensors collecting all kinds of information continues, then the kind of storage capacity required would be in the range of yottabytes by 2015 – as CrunchGear blog points out: there are “a thousand gigabytes in a terabyte, a thousand terabytes in a petabyte, a thousand petabytes in an exabyte, a thousand exabytes in a zettabyte, and a thousand zettabytes in a yottabyte. In other words, a yottabyte is 1,000,000,000,000,000GB.” However CrunchGear misses the ‘ifs’ in the report as some of the comments on the story point out. There is no doubt however, that the NSA will have some technical capabilities that are way beyond what the ordinary commercial market currently provides and it’s probably useless to speculate just how far beyond. Perhaps more important in any case, are the technologies and techniques required to sort such a huge amount of information into usable data and to create meaningful categories and profiles from it – that is where the cutting edge is. The size of storage units is not really even that interesting… The other interesting thing here is the hint of competition within US intelligence that never seems to stop: just a few months back, the FBI was revealed to have its Investigative Data Warehouse (IDW) plan. Data Warehouses or repositories seem to be the current fashion in intelligence: whilst the whole rest of the world moves more towards ‘cloud computing’ and more open systems, they collect it all and lock it down.

Canadian Internet Snooping Law

I’ve noted before that there seems to be a concerted push around the world by governments to introduce comprehensive new telecoms surveillance laws that force telecommunications and Internet Service Providers (ISPs) to record, store, and provide access to and/or share with state intelligence agencies, the traffic and/or communications data of their customers (in other words, users like us). What is noticeably here is that there is a particular logic that appears in the arguments of governments who are attempting to persuade their parliaments or people of the need for such laws. This logic that is firstly, circular and self-referential, in that it makes reference to the fact that other governments have passed such laws as if this in itself provides some compelling reason for the law to be passed in their own country. The second part of this is a king of competitive disadvantage arguments that flows from the first argument: if ‘we’ don’t have this law, then somehow we are falling behind in a never openly discussed intelligence-capability race that will hit national technological innovation too.

The media often seem oblivious to what seems obvious, and hence the story on the CTV news site today with reference to Canada’s currently proposed communications law that would allow the Canadian Security and Intelligence Service (CSIS) warrantless access to such the data from Internet and telecoms providers. They consider it to be ‘unexpected’ that the parliamentary Security Intelligence Review Committee has come out in support of the bill. Looking at the reasons why though, they are exactly what one would expect if one has been following the debates around the world and contain exactly the logics I have outlined. The story notes that the committee “points out that governments in the United States and Europe have already passed laws requiring co-operation between security agencies and online service providers” (without, incidentally, pointing out that these remain enormously controversial, or that other governments have abandoned some of their attempts) and later that “intelligence technology… requires continued access to new talent and innovative research.” However they won’t go into details as it is a “very sensitive matter.”

And absent from this debate as usual is the fact that this is not just a question of ‘national security’ if you set up these systems, you feed the US National Security Agency too. Canadian intelligence is still bound by agreements made after WW2, particularly the CANUSA agreement on Signals Intelligence (SIGINT), later incorporated into the UKUSA structure. And as we all know, right now, the USA does not always have the same strategic interests as Canada (the issue of arctic sovereignty is just one example). If this bill is passed, it’s a license for US spies, not just Canadian ones.