Exploding Data by Michael Chertoff by Michael Chertoff - Read Online
Exploding Data
0% of Exploding Data completed

About

Editor’s Note

“New release…”Former Homeland Security Secretary Michael Chertoff highlights the dangers of data collection and the difficulty that comes with trying to protect our data. A true wakeup call that will make you think twice the next time you’re asked to log in.
Scribd Editor

Interests

Summary

The most dangerous threat we—individually and as a society and country—face today is no longer military, but rather the increasingly pervasive exposure of our personal information; nothing undermines our freedom more than losing control of information about ourselves. And yet, as daily events underscore, we are ever more vulnerable to cyber-attack.

In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era. On the one hand, the collection of data—more widespread by business than by government, and impossible to stop—should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not so much the simple loss of privacy, which is almost impossible to protect, but of individual autonomy—the ability to make personal choices free of manipulation or coercion. Offering colorful stories over many decades that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today, and charts a path that balances the needs of government, business, and individuals alike.
Published: Atlantic Monthly Press on
ISBN: 9780802165787
List price: $26.00
Availability for Exploding Data by Michael Chertoff by Michael Chertoff
With a 30 day free trial you can read online for free
  1. This book can be read on up to 6 mobile devices.

Reviews

Book Preview

Exploding Data - Michael Chertoff

You've reached the end of this preview. Sign up to read more!
Page 1 of 1

ALSO BY MICHAEL CHERTOFF

Homeland Security: Assessing the First Five Years

EXPLODING

DATA

RECLAIMING OUR

CYBER SECURITY

IN THE DIGITAL AGE

MICHAEL

CHERTOFF

Copyright © 2018 by Michael Chertoff

Cover design by Daniel Rembert

All rights reserved. No part of this book may be reproduced in any form or by any electronic or mechanical means, including information storage and retrieval systems, without permission in writing from the publisher, except by a reviewer, who may quote brief passages in a review. Scanning, uploading, and electronic distribution of this book or the facilitation of such without the permission of the publisher is prohibited. Please purchase only authorized electronic editions, and do not participate in or encourage electronic piracy of copyrighted materials. Your support of the author’s rights is appreciated. Any member of educational institutions wishing to photocopy part or all of the work for classroom use, or anthology, should send inquiries to Grove Atlantic, 154 West 14th Street, New York, NY 10011 or permissions@groveatlantic.com.

FIRST EDITION

Published simultaneously in Canada

Printed in the United States of America

First Grove Atlantic hardcover edition: July 2018

Library of Congress Cataloging-in-Publication data is available for this title.

ISBN 978-0-8021-2793-8

eISBN 978-0-8021-6578-7

Atlantic Monthly Press

an imprint of Grove Atlantic

154 West 14th Street

New York, NY 10011

Distributed by Publishers Group West

groveatlantic.com

18 19 20 21 10 9 8 7 6 5 4 3 2 1

For Meryl, Emily, and Philip, and for those who serve …

CONTENTS

Cover

Also by Michael Chertoff

Title Page

Copyright

Dedication

Introduction: Big Data Is Watching You

1 What Is the Internet and How Did It Change Data?

2 How Did Law and Policy Evolve to Address Data 1.0 and 2.0?

3 Data 3.0 and the Challenges of Privacy and Security

4 Reconfiguring Privacy and Security in the Data 3.0 Universe

5 Data 3.0 and Controls on Private Sector Use of Data

6 Data 3.0 and Sovereignty: A Question of Conflict of Laws

7 Cyber Warfare: Deterrence and Response

Conclusion: Meeting the Challenge of Data 3.0: Recommendations for Law and Policy

Acknowledgments

Notes

Further Reading

Index

Back Cover

INTRODUCTION

BIG DATA IS WATCHING YOU

ON THE MORNING OF SEPTEMBER 11, 2001, while I drove to my Washington, D.C., office as assistant U.S. attorney general in charge of the Department of Justice Criminal Division, my deputy called to tell me that an airplane had crashed into New York City’s World Trade Center. Our initial assumption was that a private-plane pilot had lost his way. But within minutes, the TV news reported a second plane had smashed into the twin towers. That’s when we realized America was under attack.

Within minutes we were at the FBI Strategic Information and Operation Center, working with the FBI director to piece together who was attacking us and—importantly—how to prevent further strikes. As we began to pull together the facts, we learned a third aircraft had crashed into the Pentagon. A fourth plane, United Flight 77, had also been hijacked and was headed to Washington, D.C. The order was relayed to fighter jets to shoot down the plane; that became unnecessary after the passengers heroically stormed the cockpit and forced down the jet in Shanksville, Pennsylvania. America was at war.

Over the next hours and days, we pieced together the identities of the hijackers and concluded that al Qaeda was carrying out its declaration of war against America. Shortly after the attacks, President George W. Bush told the attorney general, Don’t let this happen again. That became our mandate.

This war was different from previous conflicts. Our enemies wore no uniforms and flew no flags; they sought to sneak up on us in the guise of ordinary civilians. Their weapons were homemade explosives. They mingled with the flow of travelers. Against this concealed attacker, radar that we relied upon to warn against enemy missiles or bombers was of no use.

How, then, to detect other terrorists and prevent them from carrying out attacks? We quickly concluded the answer lay in collecting large amounts of information about travelers and foreigners, and discerning the connections and behavior that showed links to a terror network. That meant not only reorienting our intelligence agency to focus on detecting the outlines of the terror network, but also obtaining the capability to detect patterns in the vast amounts of data being collected.

This paradigm shift in national security coincided with the expansion of the internet and the growth of commercial enterprises devoted to using data analytics for marketing and credit-scoring purposes. The private sector, infused with the urgency of preventing further attacks, began to develop new strategies to find the terrorist needle in the haystack. As the same time, the intelligence community expanded our data haystacks, using new or repurposed legal authorities (including the USA PATRIOT Act, which I participated in drafting) to accumulate information about the global flow of money, people, and communications. Over the next several years, as head of the Department of Justice’s Criminal Division and later as U.S. secretary of homeland security, I saw the awesome power of expanded data collection and analytics as tools to protect our nation and its people.

Not surprisingly, these new capabilities began to be deployed for other purposes, including commercial objectives. Just as the civilian internet was spawned by a Defense Department research effort, data collection and analytic tools used in counterterrorism were applied for a host of commercial purposes. Because I was witness to a major turning point in the growth of increasingly pervasive surveillance and the revolution in data collection, storage, and analysis—called big data by many—I was acutely aware of the power of data collection and analytics to benefit society. I also knew this information-gathering revolution would challenge America’s traditional notions and values in the areas of privacy and liberty.

As time has passed, I have been professionally and personally involved in guiding, prompting, using, and worrying about the ever-expanding harvesting of personal data by both governments and, even more so, the private sector. Perhaps more than most, I understand how much data each of us now generates for collection. That can be beneficial. It can also be very dangerous.

Having spent most of my professional career as a lawyer and as a judge, I am also mindful that our legal rules and policies established how these vast new capabilities would be deployed; yet most of this legal framework was created in the 20th century, when the data landscape was far sparser than it is today. As one who wants to encourage the positive effects of the data revolution, I believe that we are overdue to recast the rules of the road. To be sure, this data revolution should preserve, rather than undermine, our fundamental values.

This book is designed to educate the interested citizen about the scope and implications of the revolution in data generation, collection, and analytics. I also lay out a vision to retain the security and economic benefits of these developments without unwittingly sacrificing our privacy, liberty, and civic values. To illustrate how rapidly this change is coming upon us, here are four hypothetical but realistic scenarios—three of which are already upon us.

One: A young New Yorker, Alan, becomes interested in the ideology of radical jihadism. After searching the internet, he happens upon a website managed by recruiters for a terrorist organization in Syria. The terrorists detect Alan’s interest and make contact with him by sending an email to his Internet Protocol (IP) address with instructions on how to anonymize communications by downloading free software. With excitement, he steps into the shadows.

Although Alan follows the jihadis’ instructions, he also begins to discuss his increasing radicalization with friends on Facebook. He posts pictures of himself with a beard and wearing a thobe, the traditional robe worn in many Arab countries. He discusses his developing political views with his friends. He also visits websites that instruct viewers on how to build a bomb using household products and chemicals that can be easily purchased in gardening stores. At one point, Alan goes online to explore travel routes to Syria, although he does not buy a ticket. Ben, a friend of Alan’s who has in fact traveled to Syria, phones him on several occasions to encourage him to come. Alan responds by email in veiled language that he intends to carry out a task in the United States that will be heavenly. Alan also visits a local gardening superstore, buying quantities of chemicals greater than would normally be used for hobby gardening in New York City.

Unbeknownst to Alan, intelligence and law enforcement officials monitoring transnational communications, both telephone and internet, have detected his contact with Ben. But these officials do not intercept the content of the two men’s communication in real time. Because Syria is a known terrorist area of operation, the authorities seek permission from a special federal judge to collect as much information as possible about Alan’s communications. As soon as they can, the Feds want to determine whether Alan poses a threat.

Specifically, they want to subpoena metadata—email records with numbers or IP addresses—showing Alan’s contacts for the last two years; the Feds also want to obtain records of online tweets and social media postings by Alan, as well as records of his online searches and website visits. The federal agents also subpoena his credit card records.

Examining this data reveals most of Alan’s online and communications activity for many months. At the same time, application of analytic algorithms to this huge cache of data yields an outline of Alan’s evolving extreme views. He has made efforts to travel to Syria, an overseas terrorist hotbed. Alan has made contact with identifiable terrorists and researched bomb-making techniques. His credit card records show the alarming accumulation of chemicals that correlate to the bomb-making instructions on the website Alan visited.

The agents go further. Contacting the NYPD, they obtain several months of footage from video cameras positioned in lower Manhattan’s financial district. Although the volume of this footage is far too great for human eyes to review, video analytic tools with facial-recognition capability quickly identify that in the last two months Alan has been loitering near the Federal Reserve building in New York.

Based on this information, the authorities manufacture a persuasive cover story that permits an undercover agent to befriend Alan by pretending to be a violent extremist. The agent gains Alan’s confidence by expressing views strikingly similar to those Alan has expressed online. Eventually, Alan reveals to him the intent to carry out a bombing at the Federal Reserve. Alan is arrested.

Two: Brian and Kate are shopping for a birthday present for their six-year-old daughter, Ashley. At one store, they encounter Talkie Terry, a doll whose ability to listen and respond to human speech is so lifelike that your child will have a new friend. As explained by Omnicorp, the manufacturer, Terry is able to recognize speech and instantly relay it wirelessly to a server housing thousands of potential responses to any request or statement a child makes. Moreover, Terry’s server retains a file on past interactions with each child, so Terry gets to know the child—Terry will be able to remind Ashley of past events, make suggestions, and even initiate conversation. Omnicorp touts Terry as a learning tool. Terry will encourage children to learn a language, do chores, and appreciate moral lessons. Even better, parents can link Terry to their smartphones with an app, so they can monitor the child’s activities in the vicinity of Terry, since the doll is never really turned off.

Best of all, Terry is inexpensive—not surprising when you realize that the doll’s real value is in the vast amount of data it collects for Omnicorp to use in other business activities, including mail-order retail, financial services, and information brokering.

Indeed, Ashley’s conversation, and all conversation within earshot of Terry’s sensitive and always operational microphone, is not only retained on Omnicorp’s server but also mined by algorithms, revealing a good deal of information about this family’s plans and preferences. When Brian links Terry to his smartphone, it plants a cookie to monitor the websites he visits. And the next version of Terry will be even better, with the capability to emit an ultrahigh-frequency sound wave—inaudible to humans—that links up with other smart devices in the household, like a web-enabled television. Terry will let Omnicorp record what the family members watch on television as well as other data about their lives.

All of this is, of course, fully disclosed in the 75-page terms and conditions of use consent form that Brian clicked on when he connected Terry to the internet. Brian was far too busy trying to set up the doll for his excited daughter to carefully read the form. And once Brian brought the doll home for Ashley, was he really going to disappoint his daughter by taking it back?

Talkie Terry is modeled on My Friend Cayla, a doll banned by German authorities as an illegal eavesdropping device. Cayla records speech and can be accessed via Bluetooth. Other internet-connected toys include Mattel’s Hello Barbie.¹

Three: Carl is a young assistant professor who teaches privacy law, and, of course, he prides himself on vigilantly guarding his own privacy. Carl does not have a personal social media site and is careful about what he tweets. He does not visit websites that require you to download cookies that track online behavior. He uses an encrypted email service and does not authorize the service provider to mine his email for personal data. Carl feels he is prudent about the amount of personal data he allows others to access.

But Carl enjoys modern smart technology and unwittingly leaves quite a bit of digital exhaust.² A typical day begins when his alarm goes off, and its wireless connection to the coffeemaker turns on the brew cycle. Carl checks the Fitbit around his wrist to see how well he slept. That data, along with how many steps he takes today and what his heart rate is, will be continuously uploaded to his smartphone.

For breakfast, Carl makes himself a big meal of bacon and eggs. He uses the smart refrigerator to update his connected shopping list with bacon and a few other supplies; an order is automatically placed with a local grocer to deliver a quantity that approximates the current rate at which he indulges. In his car, Carl buckles up, automatically engaging his GPS and emergency communications link, as well as his internet-based radio. To save money, Carl has also signed up for an insurance-based device that records his driving behavior. These devices relay to his insurer the information that Carl tends to abruptly accelerate and decelerate, and that his typical driving route to work takes him on streets with a higher-than-average incidence of traffic accidents.

After a day of teaching, Carl uses his smartphone to add to his week’s grocery list, begun earlier at home on the refrigerator panel. After buying the items on his shopping-list app, he recalls that he is due that evening at a farewell reception for a colleague at a local bar. Using his phone as a navigation device, Carl stops in for a drink, and his colleague snaps some smartphone photos of Carl at the party. These photos automatically upload to the colleague’s social media account.

Soon after, Carl gets into his car and heads home.

That evening, Carl watches the news and a political-satire show on his web-enabled television. The high-definition TV automatically turns on when Carl enters the room, and can suggest viewing options based on his viewing preferences. The service provider can also record anytime Carl enters or leaves the room, and even when his attention shifts from the screen to something else in the room. Also, ultrahigh-frequency sound waves emitted by the television³—at a pitch inaudible to humans—automatically pair Carl’s smartphone to his television,⁴ recording when Carl searches on his phone for an item just advertised on the television.⁵ New analytic software actually allows the service provider to determine whether Carl likes or dislikes what he is viewing based upon microscopic eye movements picked up by his smartphone that correlate with positive or negative reactions.⁶

Carl’s health insurer later raises his premium because his eating, drinking, exercise, and sleep patterns could be healthier. The insurer suggests that a change in his diet and more exercise will trigger a special healthy lifestyle discount that will lower his rates. This is presented as a positive nudge toward reducing illness. His auto insurer also informs Carl that his rates will rise because his driving style is erratic, and he has been linked via social media to drinking establishments just before driving his vehicle. Commercial marketers send Carl advertising material based on preferences established from his stream of digital exhaust. Election-campaign specialists target him with ads based upon a behavioral analysis of Carl’s reaction to news events and political commentary.

All the features in Carl’s story currently exist. Progressive Insurance rewards drivers who install a monitoring device in their automobiles. One employer pays a bonus to employees who get seven hours of sleep a night, as recorded on their tracking devices. Eye-tracking technologies are currently being piloted on video systems.

Four: James’s eyes pop open, prying his thoughts from slumber. Once again, he has woken up at 5:43 a.m. James always does. The monitor never lets him linger in bed. He sometimes wonders what the early-21st-century snooze function might have been like. He has never experienced such a thing but has seen it in a few old movies. In modern 2084, the ideas of the previous century have not been deemed relevant and most of the media has been destroyed.

James has no such luxury. At the optimal awakening time, the monitor, already aware of his sleep phase, begins playing sounds to generate his awakening. The audible portions are supposed to be relaxing. James has chosen beach waves that remind him of his childhood on Cape Cod. Nearly inaudible portions connect with his