Technocreep

Home > Other > Technocreep > Page 1
Technocreep Page 1

by Thomas P. Keenan




  THOMAS P. KEENAN

  techno

  creep

  THE SURRENDER

  OF PRIVACY AND

  THE CAPITALIZATION

  OF INTIMACY

  To my parents, Ruth and Joseph, for allowing me to have white rats and cancer viruses in our basement at the age of fourteen. To the love of my life, Keri, who inspires me every day with her amazing Australian wit and wisdom; and to my wonderful son, Jordan, who bounces ideas around with me like a pro and is navigating his own amazing path in life.

  Published by arrangement with OR Books LLC, New York

  Copyright © 2014 by Thomas P. Keenan

  All rights reserved. No part of this book may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, without the prior written consent of the publisher or a license from The Canadian Copyright Licensing Agency (Access Copyright). For a copyright license, visit www.accesscopyright.ca or call toll free to 1-800-893-5777.

  Greystone Books Ltd.

  www.greystonebooks.com

  Cataloguing data available from Library and Archives Canada

  ISBN 978-1-77164-122-7 (pbk.)

  ISBN 978-1-77164-123-4 (epub)

  Front cover design by Bathcat Ltd.

  Distributed in the U.S. by Publishers Group West

  We gratefully acknowledge the financial support of the Canada Council for the Arts, the British Columbia Arts Council, the Province of British Columbia through the Book Publishing Tax Credit, and the Government of Canada through the Canada Book Fund for our publishing activities.

  Contents

  Preface

  Introduction

  INTELLIGENCE CREEP

  CAMERA CREEP

  IMAGE CREEP

  SENSOR CREEP

  TRACKING CREEP

  SENSATION CREEP

  BIO CREEP

  BODY CREEP

  TIME CREEP

  GOVERNMENT CREEP

  DECEPTION CREEP

  PHYSIBLE CREEP

  CHILD CREEP

  PET CREEP

  ROBOT CREEP

  CREEP THEORY

  ANTI-CREEP

  Acknowledgments

  Bibliography

  References

  Figure 1. IBM 1620 computer like the one at Bronx Science. Erik Pitti, via Flickr/Creative Commons Attribution License.

  Preface

  I wrote my first computer program in 1965, while I was a student at the legendary Bronx High School of Science. Tech pioneers such as Marvin Minsky, Robert Moog, and Martin Hellman once walked its halls, which sometimes reeked of chloroform. In those days, students were actually allowed to perform surgery on small mammals. I remember coming in early one morning to help my friend Mark remove the spleens from several hapless white rats.

  Bronx Science had a computer, then a rarity in all but the largest businesses and almost unheard of in a school. It was a cranky card-munching monster that we regarded with a combination of veneration and lust. In retrospect, jockeying for time on a computer seems like a bizarre hobby for a group of normal teenagers. However, the students at Bronx Science were anything but normal. Eight alumni have gone on to win the Nobel Prize. Two of the Nobel laureates in physics, Russell Hulse and Hugh David Politzer, were in my graduating class. I was in good company.

  Access to the school’s computer was strictly controlled. Only seniors were allowed near the hallowed IBM 1620 console. We juniors were forced to sit for hours in front of whirring calculators, doing endless numerical analysis calculations and writing down the answers. Our teachers hoped that this would help us appreciate the magical day when we finally got to put our little deck of carefully punched cards into the whirring IBM 1622 Card Reader/Punch. The computer would then do the calculations we had slaved over for the last term in mere minutes, or even seconds.

  Driven to get my hands on a computer sooner, I discovered a special youth training program at New York University. If we were willing to give up our evenings and weekends, the folks there would teach us all the computer programming we could possibly absorb. We were even allowed to leave our card decks, secured with rubber bands, for the computer operators to run when they had nothing better to do.

  The door of the building that housed NYU’s computer had a sign that said “United States Atomic Energy Commission.” There was a curtain to shield the IBM 7094 from prying eyes when it did secret work. The Soviets had launched Sputnik in 1957, leading to fears that they would dominate the world from space. The 1962 Cuban missile crisis had us doing air raid drills in school. Clearly computers were going to play a role in saving America, and we were being trained to play a part in that drama.

  Under the leadership of professors including Max Goldstein and Jacob T. (“Jack”) Schwartz, and coached by a kind-hearted and energetic NYU researcher named Henry Mullish, there were no limits to what we could accomplish. We created whole new computer languages, fixed bugs in existing ones, and wrote emulators for computers that were still on the drawing boards. I wound up programming everything from the statistics for numerous PhD dissertations to particle physics calculations to some of the structural engineering data for the original World Trade Center. I earned my keep on that last project by catching a glitch that might have caused the two 110-story towers to collide in high wind conditions.

  Back then, computers spat out their results in 132 column-wide format on oversized continuous sheets of paper. When I pulled out a printout while riding the Bx40 cross-town bus in the Bronx, I always got strange looks from the other passengers. I was proud that I had something special and almost magical in my hands. I now realize they probably thought I was a very creepy kid.

  Years of being a computer programmer, a computer science ­professor, and a technology journalist have helped me realize that almost every new technology can be misused and often become deeply disturbing. In 1984, I had the great fortune to co-write and host a CBC IDEAS series called Crimes of the Future, in collaboration with Dr. Duncan Chappell, then head of the Criminology Department of Simon Fraser University; and Dave Redel, a very talented CBC Radio Producer.

  Those programs marked the first time many people heard about identity theft, except perhaps in the context of someone going to a graveyard to copy the name and birth date of a deceased infant. We talked about crimes that have now become real, such as trafficking in human body parts, and others that are only now surfacing, like “wireheading”—the direct stimulation of the pleasure centers of the brain. Back then, we had to use the work of science fiction writers like Larry Niven and Spider Robinson to introduce this intriguing practice. Today there are detailed, instructions for brain self-stimulation on the Internet.1

  For almost five decades now, I have been watching as everybody else gets on the tech bandwagon, sometimes adroitly, sometimes clumsily, and often without fully understanding the implications of what they are doing.

  This work has taken me to conferences like DEF CON; Black Hat; Computers, Freedom, and Privacy; and led to unexpected adventures such as being allowed to scrub in on a liver transplant operation. I have had the privilege of talking to thousands of academics, visionaries, and technology creators, and come away with the strong sense that we need to raise the bar in our thinking about technocreepiness, and sooner rather than later.

  Over half the people on that Bronx bus today would now be glued to their smartphones, connecting with friends, checking sports scores or enjoying celebrity gossip. Would any of them be thinking about the next chapter in technology, and how it is going to change their lives?

  This is a book about the creepy pioneers of technology: what they are doing and why we need to know about it. In the pages that follow we will go on a journey into some of the disturbing ways our lives are unfolding, often behind the s
cenes and without our knowledge or permission. Not all of these incursions are necessarily bad. The benefits of knowing you are prone to a certain disease, for example, might outweigh the risks of having genetic tests on your medical record. And what seems creepy today may be the accepted norm in the future.

  Still, there is this nagging feeling that decisions we make today may come back to haunt us in the future, in ways that are hard to envision. Yet that is precisely what we should be doing.

  Introduction

  Modern technology is not what it seems. Or rather it is much more than it seems. Digital wheels are turning in the background that most people do not even know exist. Increasingly, we are getting an uneasy feeling about this … a sense that things are not quite what they seem.

  So much is happening that is out of our view and beyond our control. Like a network of mushroom spores sending out subterranean tendrils to silently exchange genetic material, our technological systems are increasingly passing information back and forth without bothering to tell us. They are parsing and analyzing it to squeeze out the deep meaning of what we say and do, sometimes before we are even aware of our own intentions.

  Technocreep is quietly but relentlessly invading our daily lives:

  You use your smartphone to take a photo, and it auto-uploads it to Facebook. Without your knowledge, metadata such as the type of camera you use and the precise location where you took the photo is also being uploaded. Facebook may remove that information before making your photos public, but the company certainly has access to all of that metadata for its own purposes. Facebook now has the world’s largest known database of personal information and photos, many of them conveniently labeled with your real name. How deep is the analysis of your words and photos by Internet giants like Facebook and Google? According to an article in Wired, the computers at Facebook can use artificial intelligence to tease out the emotions in your ramblings and figure out when you are being sarcastic.2 That same article says that Google can distinguish the facial features of a cat from a human.

  You decide to check your email, which, like most people, you are now getting for free from a provider like Google, Yahoo, or Microsoft. Hmm, no new mail has been delivered for the past few hours. Do their servers get backed up like the post office at the holidays? Or is something more sinister going on? Is your mail being siphoned off for some sort of deep-level human or computer analysis? Given the revelations of Edward Snowden and others, your concern might be justified. What should certainly disturb you is the fact that you have no way to really know how your web-based email is processed, and virtually no tools to investigate it; while others seem to have many tools to investigate you.

  Before heading to bed, you peruse the electronic catalog of an upcoming estate sale, lingering on the image of a nice chandelier. An advertisement for the website www.chandelier.com pops up on your screen. How did they know what you were thinking about? Perhaps it was because the sale image was saved as chandelier.jpg. But perhaps not. Image recognition technology is progressing at an amazing pace. Again, the wheels are turning in the background in a creepy fashion.

  Late at night, you hear the hard drive whirring on your computer. The monitor is flickering even though nobody is using it. Perhaps it makes a few of those strange “bonging” sounds that signify someone is sending you a message. You look. But there is nobody there, and the computer, as if sensing your presence, has ceased its frantic activity. All is calm. But you are not sure if it was Microsoft doing software patches, a hacker trying to steal your information, or … something else.

  Bars in several cities have installed cameras that silently watch their clientele and make inferences about them from their physical characteristics. Armed with the free smartphone app SceneTap, prospective patrons can check out how full the place is (“chillin” to “hoppin”) as well as the average age and percentage of males and females there.

  “Suggestion algorithms” are popping up on shopping and social networking sites. It is no surprise that Amazon is trying to sell me the last few things I price-checked there (and bought elsewhere). But when it suggested “adult size disposable diapers” as a good purchase for people buying certain video games, did it “know too much”?

  Google’s Regina Dugan has suggested with a straight face that you may soon swallow a password pill or sport a digital tattoo to log on to computer systems.3 Both ideas are technologically feasible right now, but should our employer be allowed to brand us or make us take a pill?

  Next generation wearable computers such as Google Glass may start regularly tracking where you are looking.4 That information will then be sold to advertisers and others who are seeking a window into your mind. Based on where your gaze lingers, they will suggest things you want to buy even before you know you want them.

  Your phone may listen for audio cues about where you are. Is that a football stadium announcer it hears? Perhaps you would like a discount coupon for the team’s store, or, if you are slurring your words, a connection to a “drive me home in my car” service.

  Perhaps you will seek refuge from all this invasive technology in some nostalgic low tech activity like attending a rock concert. We will still have those in the future, as people clamor for the “live experience” in a world with unlimited digital media access. But the fiftieth ­anniversary Woodstock concert will probably be a lot different from the original one in 1969.

  At Woodstock 2019, you may be swatting away disposable flying robot cameras that people have launched to catch a better view of the performers. Folks all around you will be pushing the “find my friends” button, revealing their exact location at the concert venue. Unlike today’s friend finder apps, the 2019 version may also tap into their brain waves and body chemistry to decide if they are interested in joining you for some food, or perhaps something else. Yes, babies will be conceived at Woodstock 2019 just as they were in 1969.

  If you have broken some minor rule like forgetting to renew your vehicle’s license, you will come back at the end of the show to see your “smart license plate” displaying “EXPIRED” where the number should be. Should you decide to buy a souvenir T-shirt, your every move will be tracked by cameras that make uncannily accurate estimates of your age and gender, and then predict your buying habits.5 They may even recognize you by your face or change the prices based on the color of your credit card, which it will be broadcasting to the world.

  Should you seek medical help at Woodstock 2019, you will almost certainly receive tests and treatments tailored to your unique genetic makeup. Dr. Leroy Hood, the biologist who pioneered automated DNA sequencing, describes what you should expect at the Woodstock 2019 first aid tent. “We’ll be able to prick your finger,” he says, “and take a droplet of blood and make ten thousand measurements that tell us about a gazillion different things that may speak to why you have apparent cardiac pain. There’ll be very powerful imaging devices that can probably be done at Woodstock that could look at the brain or look at the heart.”6

  Hood also believes that this type of personalized medicine will come down in cost very rapidly. “My own prediction,” he says, “is with third generation DNA sequencing … the genome will cost $100 and we’ll be able to do it in fifteen minutes.” That price drop, from the current level of thousands of dollars, should put your mind at ease. After all, there will be no way to skip out on your bill at this medical facility. They will have your DNA sample.

  Unlike in 1969, when misadventures with psychedelic chemicals accounted for many visits to the medical tents, the Woodstock 2019 medics may be treating the after-effects of electronic stimulation of the pleasure centers of the brain. And just as crowdfunding sites are starting to determine which products are manufactured by online consensus, Woodstock’s organizers may be able to tap into the “hive mind” of concert-goers to keep the show moving at just the right pace.

  If you cannot make it to the live event, there will be ultra-high-resolution videos to enjoy, streamed directly into your retina or perhap
s even your brain. Organizers will probably use big data analytics and artificial intelligence to choose the lineup of musicians. That is how Hollywood already decides which television shows we are most likely to watch.7

  This book is about the unseen ways in which technology is already changing our lives. We will visit the hotel suites at the DEF CON and Black Hat conferences, where hackers attack circuit boards and tweak software late into the night. We will go into the online nooks and crannies where digital exploits are secretly shared. We will even examine a kids’ toy that frightened the National Security Agency so much that it was banned from their building. You will learn why you might want to avoid certain kinds of medical testing and why your online presence will definitely outlive you, unless the “transhumanists” are correct and the first immortals are already living among us.

  Many people believe that these disturbing technologies are confined to the Internet and that if they are careful, or even avoid online activity altogether, they will be safe. But the technologies that will truly change our lives will be in our cars, our streetlights, our hospitals, and even inside our brains and bodies. Our favorite watering holes, even our pets and our children, are being infested with technocreepiness.

  The general public learns about creepy technologies episodically. A whistle-blower unveils whole areas of government or corporate snooping. A probing journalist figures out how big data can be used to link together nuggets of your life to create a chillingly accurate portrait of you. A scientist works backwards from a DNA sample to infer the most likely surname of the person it came from.8 Perhaps you receive a particularly astute yet unsettling suggestion for a new contact on Facebook or LinkedIn, and wonder how they did that.

  Every new technology eventually attracts calls to restrict or ­regulate it, and often to find a way to turn it into a revenue stream and make it taxable. But the flow is becoming too fast, too diverse, and too imaginative for lawmakers to keep up.

 

‹ Prev