Technocreep

Home > Other > Technocreep > Page 21
Technocreep Page 21

by Thomas P. Keenan


  Though that would not be hard to figure out either. Your metadata might show you calling or visiting a certain church, or your checking account might show a lot of $18, $36, and $180 donations, the favorite Chai numbers for Jewish donors. The other factor is that tremendous progress is being made in machine learning and artificial intelligence. As this privacy singularity meets the Vinge/Kurzweil artificial intelligence singularity … the outcome is, almost by definition, unknowable.

  In 1984, when Dr. Duncan Chappell and I were writing our CBC Radio IDEAS Series Crimes of the Future, we picked up on some emerging crimes like identity theft and traffic in human organs that have since become household words. On the other hand, we predicted that by the early 21st century, people would be routinely using electricity to stimulate the pleasure centers of the brain for recreation. Many new drugs have emerged since 1984, but “wireheading” is still a fringe technology. And, of course, in writing the programs, we completely missed the importance of a little something called “The Internet,” which was then in its infancy.

  In the inevitable gap between my writing these words and you reading them, new and even more disturbing facts about technology will have emerged. We will know more about what the NSA can do. We will learn more about how companies are burrowing into our psyches in the interest of competitive advantage. More smartphone stalking applications will appear. The whole area of biological manipulation will probably grow at an exponential pace.

  Some of tomorrow’s headlines will be more extreme examples of creepy technologies described in this book. Others may take us in entirely new directions. Only in retrospect can we know which ones are so creepy that people simply refuse to use them. And, of course, some will be well beyond our control as individuals, and require a higher level of intervention. Many of the creepiest aspects of new technologies will be hidden from our view, and we will only catch the occasional glimpse of them.

  Perhaps the creepiest aspect of our relationship with technology is the misguided belief that we can have the benefits of new technologies without the risks. Just as there is no pleasure without pain, and no peace without war, we will always need to question the cost, the risk, and the motivation of those who may benefit from changing our lives through technology.

  It will not be easy. One thing is certain: we will need to continuously make decisions on both the individual and societal levels. Long before there were viral cat videos, there was a newspaper ad offering “Free to Good Home” your choice of a playful kitten or a “handsome husband, good job, but says he doesn’t like cats and the cat goes or he goes.” The ad then suggested “come and see both and decide which you’d like.” It is almost certainly a good natured joke between spouses who really care for each other. Yet taken literally, it nicely sums up the intensity of the hard choices we will need to make:

  Every time we post a photo on Facebook, retweet on Twitter, buy a plane ticket online, or even search for one, we are making personal privacy choices that have consequences.

  When we vote for political candidates with particular views on the issues raised in Technocreep, we are making societal decisions that have consequences. We can also vote with our wallets, ­choosing the most privacy-friendly technologies.

  As we talk to our friends, our co-workers, and our children about Technocreepiness, we are taking a stand about the kind of future we want to see.

  If you are left with feeling that the world is spinning out of control, you’ve been paying attention. There is, however, some very good news. There are some concrete ways to minimize the impact of invasive technologies on your life and those of the ones you love.

  But you have to start now. Let’s do exactly that.

  Anti-Creep

  Picture yourself suddenly living in the most repressive, repulsive, privacy-unfriendly country on earth. Imagine how such a society could nefariously use the technologies that we so readily embrace against us. How those in charge could track us, hunt us down, link us to our friends, draw subtle inferences, and, ultimately, make our lives virtually unlivable.

  Think how much you would regret posting certain photos, connecting with people online, and making certain purchases. How incriminating your travel history might appear. Perhaps you once did a Google search on a politically incorrect topic or even looked up “how to kidnap a celebrity” while watching a crime show on TV. You’re in big trouble now.

  Most people still behave as if we live in the polar opposite of this world—a free, open, democratic society where we can placidly enjoy the many advantages of new technologies. The truth is that we are actually somewhere between these two paradigms, and slipping rapidly towards the scarier one. There are things you can do to throw people off your cyberscent and retain as much privacy and freedom as possible, but you do need to start taking action now.

  In researching and writing Technocreep, three things became very clear:

  1. The technological capability to spy on us is becoming more sophisticated, less expensive, and more widely available. Any shopkeeper can buy a $50 camera to watch and record the actions of customers. Malls and even whole cities can grab information on us from the unique identifiers inside our cell phones. Facial recognition technology is progressing so fast that soon you won’t need to give your name: your face will identify you at the cashier’s till or even in a crowd.

  2. The motivation to use this technology is becoming more and more compelling. Governments, corporations, and even nosy neighbors are starting to feel that “more is better” when it comes to data, and “if we can collect it, we should.” The cut-throat competition between online, brick-and-mortar, and hybrid retailers has fueled an “anything goes” mentality of massive data collection, archiving, resale, and brokering. A new breed of “data scientists” is starting to rule the roost, as businesses smell profit in techniques like collaborative filtering, long tail personalization, and sophisticated suggestion algorithms.

  3. There is a tremendous variation in how well individuals guard their privacy. Some people are using email anonymizers, Tor (The Onion Router), and multiple layers of post office boxes to cover their tracks. One fellow I know was prevented from accepting a volunteer position at a charity casino because he refused to divulge his (real) birth date for a background security check. We are now learning that these commonsense privacy protection techniques may be of dubious utility because governments, data brokers, and others have already amassed huge amounts of information about us. At the other end of the spectrum, some people are sitting ducks for identity theft, posting tagged facial photos and giving up their names, addresses, email, and other personal data in return for paltry rewards like a trade magazine subscription or a store loyalty card.

  I hope that Technocreep has alerted you to the profound and fast-moving technological developments that are affecting your life today and will shape it in the future. This chapter is intended to give you a basic toolkit to carry out your personal action plan to deal with Technocreepiness.

  Please think of this chapter as the starter toolbox that you would give someone moving into a first home. Those pliers and hammers and wrenches may help hang a picture, and even go a long way towards preventing serious household damage from a leaky toilet.

  However, a set of hand tools probably will not solve major maintenance problems, just as these tips will not make you immune to serious efforts to attack your privacy by governments and corporations. But you will be much better off than your neighbor who has nothing.

  One difference between home repair and protecting your digital life is the rate at which new tools are required. The only hand tool I’ve bought in the last five years is a Torx screwdriver to deal with those tamper-resistant screws that keep popping up on things I’d like to open. If you let your digital toolkit sit idle for five years, it would be laughably out of date, as new threats emerge, and new countermeasures are developed. This information in this chapter will therefore be updated as appropriate at www.technocreep.com.

  Let’s get star
ted!

  Know Thine Enemy.

  The first step in formulating an intelligent response to growing technocreepiness is to understand who is after your information and why they want it. As discussed earlier in this book, the answer turns out to be a dizzying array of governments, corporations, even non-profit organizations and snoopy individuals. They get your information directly from you, from your activities in the online and physical worlds, from each other, and from data brokers.

  The revelations of Edward Snowden, William Binney, and the journalists who reported on them showed how governments are actively collecting information about billons of people and actually using it on a day-to-day basis.346 We have even learned that the National Security Agency is using radio waves to spy on computers that are not even connected to the Internet.347

  The examples in Technocreep have, I hope, convinced you that private companies can be just as curious about you as government agencies, and just as effective in their snooping, largely because they have enlisted you as their unwitting ally.

  The Internet has also put tremendous power into the hands of private citizens. Your nosy neighbor might learn a great deal about you by researching you online, flying a tech-laden drone near your home, or even just gazing at you with Google Glass.

  Because the stakes are so high, we are locked in a never-ending battle between increasingly sophisticated tracking techniques and clever countermeasures. Companies started to leave “cookies” on your computer to track your repeat visits. Consumers got smart and installed “cookie crunching” software. Companies then discovered “browser fingerprinting,” which takes advantage of the near-uniqueness of your computer, based on esoteric things like its clock speed and what software you have installed.

  Here are some things you can do to find out who is watching you in the online world and how they are doing it:

  Install software to help you track the trackers.

  Ghostery works on most browsers and mobile devices. It will show a list of trackers on most webpages and allow you to selectively block them. The Electronic Frontier Foundation has an excellent, and safe, add-on for the Firebox browser called Lightbeam that graphically visualizes the web of connections triggered by something as simple as visiting the website of the New York Times.

  Block pop-ups, ads, and invisible websites.

  Software to do this is widely and freely available. The most popular ones are currently Adblock Plus and Disconnect. As a delightful side effect, blocking online ads often speeds up your Internet browsing while decluttering your screen. If you are an advanced user, and using the Chrome browser, have a look at the HTTP Switchboard plug-in, which gives you even finer control over who can do what to your ­computer.

  Go deep diving into places like your Facebook profile.

  Often, information that has been collected about you is stored on a far-away server, so you have only indirect access. Facebook certainly operates that way, refusing to provide tools to answer simple questions like “who’s stalking my profile” or “who has unfriended me.” By contrast, LinkedIn and Academia.edu tell you who has viewed your profile, though sometimes you need a paid account to get the full details.

  An example of indirect snooping would be to view the Page Source of your Facebook Profile. Among other things, it will have a bunch of nine digit or so numbers that correspond to people. A WikiHow article claims that you can use these to find out who is viewing your page.348 My own experimentation, and a few off-the-record chats with folks at Facebook, suggests that things have changed since this method worked. After all, trying to torture your Facebook profile to give up hidden information is not a supported feature of the service.

  The other thing people often want to track on Facebook is being “unfriended” by someone. That’s a lot easier. You can simply look at your friends list and see who has gone missing. This means they either unfriended you or de-activated their Facebook account. Since this can be tedious, there are apps like like “Unfriend Finder” to automate the process.349

  Periodically clear out your computer’s history, cache files, and other digital detritus.

  Web browsers have a “clear history” button and the best choice is probably “clear everything.” This might mean you have to re-enter something like a bank account number later, but would you rather have it stolen by a hacker? In fact, if you can live without having your browser remind you where you surfed earlier today, simply tell it to “keep no history.” Programs to scrub down the rest of your computer are available, both for free (e.g. CCleaner) and for a fee (e.g. Privacy Eraser Pro), and you should use one or more on a regular basis.

  Organize Your Digital Life Compulsively.

  Knowledge definitely is power in our information-rich environment. Having a transaction receipt, copy of an email, or log of a phone call can make all the difference when you are dealing with a company or institution that already knows a lot about you. Excellent digital record-keeping is also invaluable if you have the misfortune to become the victim of identity theft.

  Fortunately, computer storage is trending towards zero cost, so there’s no reason you can’t archive your data, just like major corporations do. There is also a wide range of software, such as NeatReceipts, Mint, and Evernote that will assist you in the process of organizing your digital life.

  Yes, there are privacy risks associated with each of these. Mint asks for the passwords to your banking accounts. Only you can decide if you trust Mint (owned by Intuit, the dominant makers of tax software) enough to provide that information in return for the benefits offered. In a similar fashion, you might use NeatReceipts to scan all sorts of sensitive data onto your laptop, then leave the whole thing in a taxicab or at airport security.

  Here are some tips to consider:

  Password protect all your devices.

  It just takes a few extra seconds and will deter most casual intruders. It also can have some legal force because, depending on where you live, it can be a criminal offense to try to break into your locked device. Also, you should set your phone to lock itself after a reasonable period of inactivity.

  The next level of protection is to encrypt your entire hard disk.

  This is especially relevant to laptops that are traveling with you, since it will make it difficult if not impossible for someone to access the data on it. The dominant current operating systems, Windows 8 and OS X for the Mac, can do this automatically and seamlessly for you. If you are running something else, there are a range of free (e.g. TrueCrypt) and commercial (e.g. Checkpoint Full Disk Encryption) products to consider.

  Choose your password well.

  Experts advise using complex passwords, and certainly not words in the dictionary of any language. Those can be compromised by the automated brute force attack of just trying all the words. You should also use a different password at each site since there have been high profile password compromises of companies like Adobe and LinkedIn. These can put you at risk if you have used the same password on other sites. If you have problems remembering passwords, consider either a hardware or software password manager. These have their own risks but, when used properly, can certainly help protect you.

  Never put passwords, credit card numbers, or anything else that is truly sensitive into an email.

  Aside from the ability of governments and corporations to snoop, emails are favorite places for thieves to try to mine your data. They can go through, finding passwords to other accounts you have set up, and even changing them so you don’t have access anymore. The day you rush out of the airport lounge without logging off from your email account might be the day that a lot of your sensitive information is stolen and possibly sold online.

  Beef up your authentication.

  Businesses have long used “multi-factor” authentication such as keyfob security tokens that display a changing number that must be ­entered along with a password. This builds on the idea that security can be enhanced by a combination of “something you know” (e.g. a password), “
something you have” (e.g. a keyfob), and something you are (e.g. a fingerprint or hand geometry).

  You can use your smartphones as a kind of keyfob, at least to protect your Google accounts. Just turn on that company’s optional “two-step verification.” Then, when Google’s computers see you coming from a new device, they’ll require an access code that’s sent to you via your phone.

  Get ready for biometrics.

  The 2013 introduction of the iPhone 5s with TouchID fingerprint was expected to bring biometric identification squarely into the consumer mainstream. The fact that it was hacked within days by using a photograph and a fake finger demonstrated that the problem of secure and convenient identity authentication will be with us for a long time. However, new products coming down the pike, such as the Myris eye scanner, will soon bring biometrics to the masses.350

  The Sandy Hook school shootings inspired the creation of the Smart Tech Challenges Foundation, whose goal is to reduce gun violence through technology innovation. It is already spawning practical projects such as a gun that reads the owner’s fingerprint and one that can only be fired by the person wearing an RFID-chipped wristwatch.351

  Get a digital shredder.

  Actually there are plenty of programs that have this capability, even for free, so it’s no big deal to wipe files, disks, etc. The getting organized part is a bit harder. There are rules (often a seven-year retention period) for financial records, but what about your old love (e-)letters? Your baby’s first scrawlings on a tablet? All those family photos that you really never liked?

 

‹ Prev