A Dual-Edged Sword: Providing Information, Stealing Privacy - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

06:31 PM

A Dual-Edged Sword: Providing Information, Stealing Privacy

A former National Security Council cyberspace expert explains how government technology can be used to simultaneously provide useful data--and steal privacy.

The power of new technologies to do good is often inextricably linked to their ability to cause harm.

Think about it. Early steam engines afforded enormous benefits--but, until labor laws were enacted, they allowed men, women, and children to work appallingly long days in mills and mines. Automobiles gave us freedom of movement--but, before public outrage resulted in new safety standards, auto accidents killed thousands needlessly. And, of course, the same nuclear energy that provides much of our electricity alarms us when despots threaten to use it in weapons of mass destruction, real or imagined.

Advanced information technologies are today's new "dual-edged sword." Computers can gather and analyze trillions of pieces of personal information about us, but we haven't yet faced up to what these powerful technologies can do in the hands of law enforcement.

Last summer, we saw a Pentagon proposal to "protect" the nation from crime and terrorism. The Total Information Awareness, or TIA, program would deploy cutting-edge information technologies to gather all available information about almost everybody. Using new data-mining techniques to comb this data, officials would look for patterns and try to identify which of us were the "bad guys."

When the plans for TIA were disclosed, the public immediately reacted with such furor that Congress quickly killed the program.

But since then, other questionable ideas have stepped into the breach. The Multistate Anti-Terrorism Information Exchange (yes, it's known as Matrix) is still not getting the level of public attention it warrants. Matrix gives participating law-enforcement agencies the ability to almost instantly build files on individuals, using essentially the same data-collection and analysis approaches the Pentagon's TIA program proposed.

Matrix officials won't reveal exactly what data sets might be tapped, but, at a minimum, we can expect the details of our drivers' licenses and traffic violations, property-tax records, lists of business associates, and marriage and divorce records to be included, along with available images. The files will also comprise vast amounts of data purchased from private companies that make it their business to track our purchasing and other behaviors. And, if pilot projects are an indication, any appearance in police files--even as a victim, complainant, or witness--will land us in the Matrix.

Matrix helps law-enforcement personnel make predictions--Is this person a good guy? A bad guy? Apt to be problematic?--through "factual data analysis" algorithms. Those highly educated guesses are produced through the system's enormous computing power.

Matrix outrages many people because of its possible privacy and civil-liberty violations. But even if privacy issues don't disturb you, Matrix presents at least four other serious concerns:

Matrix as a system may have fatal design flaws. At its core, Matrix is a human/software system that collects information, collates it, and analyzes it. Each of these steps has potentially fatal flaws. "Garbage in, garbage out" is as true today as it ever was. Data can be wrong, out of date, or generated by those with malicious motivations. Information will be added from jurisdictions with different laws, standards, interpretations, and expectations for accuracy. No amount of sophisticated technology can make up for bad data.

And when it comes to analyzing this data, both machines and humans can fail. Data-mining techniques to tease out patterns or correlations in complex databases are still very much in their infancy. Those in charge of interpreting these patterns will certainly have wide variations in training, capability, and interest. In the age of paper files and faxes, this might not have mattered much. But now, at the push of a button, hundreds and perhaps thousands of innocent people can come under police suspicion.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
1 of 2
Comment  | 
Print  | 
More Insights
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
What Becomes of CFOs During Digital Transformation?
Joao-Pierre S. Ruth, Senior Writer,  2/4/2020
Fighting the Coronavirus with Analytics and GIS
Jessica Davis, Senior Editor, Enterprise Apps,  2/3/2020
IT Careers: 10 Job Skills in High Demand This Year
Cynthia Harvey, Freelance Journalist, InformationWeek,  2/3/2020
Register for InformationWeek Newsletters
Current Issue
IT Careers: Tech Drives Constant Change
Advances in information technology and management concepts mean that IT professionals must update their skill sets, even their career goals on an almost yearly basis. In this IT Trend Report, experts share advice on how IT pros can keep up with this every-changing job market. Read it today!
White Papers
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll