[Infowarrior] - Surveillance made easy

Richard Forno rforno at infowarrior.org
Mon Aug 25 03:16:53 UTC 2008


http://technology.newscientist.com/channel/tech/dn14591-surveillance-made-easy.html

Surveillance made easy

     * 09:00 23 August 2008
     * NewScientist.com news service
     * Laura Margottini


"THIS data allows investigators to identify suspects, examine their  
contacts, establish relationships between conspirators and place them  
in a specific location at a certain time."

So said the UK Home Office last week as it announced plans to give law- 
enforcement agencies, local councils and other public bodies access to  
the details of people's text messages, emails and internet activity.  
The move followed its announcement in May that it was considering  
creating a massive central database to store all this data, as a tool  
to help the security services tackle crime and terrorism.

Meanwhile in the US the FISA Amendments Act, which became law in July,  
allows the security services to intercept anyone's international phone  
calls and emails without a warrant for up to seven days. Governments  
around the world are developing increasingly sophisticated electronic  
surveillance methods in a bid to identify terrorist cells or spot  
criminal activity.

However, technology companies, in particular telecommunications firms  
and internet service providers, have often been criticised for  
assisting governments in what many see as unwarranted intrusion, most  
notably in China.

Now German electronics company Siemens has gone a step further,  
developing a complete "surveillance in a box" system called the  
Intelligence Platform, designed for security services in Europe  
andAsia. It has already sold the system to 60 countries.

According to a document obtained by New Scientist, the system  
integrates tasks typically done by separate surveillance teams or  
machines, pooling data from sources such as telephone calls, email and  
internet activity, bank transactions and insurance records. It then  
sorts through this mountain of information using software that Siemens  
dubs "intelligence modules".

This software is trained on a large number of sample documents to pick  
out items such as names, phone numbers and places from generic text.  
This means it can spot names or numbers that crop up alongside anyone  
already of interest to the authorities, and then catalogue any  
documents that contain such associates.

Once a person is being monitored, pattern-recognition software first  
identifies their typical behaviour, such as repeated calls to certain  
numbers over a period of a few months. The software can then identify  
any deviations from the norm and flag up unusual activities, such as  
transactions with a foreign bank, or contact with someone who is also  
under surveillance, so that analysts can take a closer look.

Included within the package is a phone call "monitoring centre",  
developed by the joint-venture company Nokia Siemens Networks.

However, it is far from clear whether the technology will prove  
accurate. Security experts warn that data-fusion technologies tend to  
produce a huge number of false positives, flagging up perfectly  
innocent people as suspicious.
"These systems tend to produce false positives, flagging up innocent  
people as suspicious"

"Combining two different sources of data has the tendency to increase  
your false-positive rate or your false-negative rate," says Ross  
Anderson, a computer security engineer at the University of Cambridge.  
"If you're looking for burglars in a run-down district where 50 per  
cent of men have a criminal conviction, you may find plenty. But if  
you're trying to find terrorists among airline passengers - where they  
are extremely rare - then almost all your hits will be false."

Computer security expert Bruce Schneier agrees. "Currently there are  
no good patterns available to recognise terrorists," he says, and  
questions whether Siemens has got around this.

Whatever the level of accuracy, human rights advocates are concerned  
that the system could give surveillance-hungry repressive regimes a  
ready-made means of monitoring their citizens. Carole Samdup of the  
organisation Rights and Democracy in Montreal, Canada, says the system  
bears a strong resemblance to the Chinese government's "Golden Shield"  
concept, a massive surveillance network encompassing internet and  
email monitoring as well as speech and facial-recognition technologies  
and closed-circuit TV cameras.

In 2001, Rights and Democracy raised concerns about the potential for  
governments to integrate huge information databases with real-time  
analysis to track the activities of individuals. "Now in 2008 these  
very characteristics are presented as value-added selling points in  
the company advertisement of its product," Samdup says.

In June, the PRISE consortium of security technology and human-rights  
experts, funded by the European Union (EU), submitted a report to the  
European Commission asking for a moratorium on the development of data- 
fusion technologies, referring explicitly to the Siemens Intelligence  
Platform.

"The efficiency and reliability of such tools is as yet unknown," says  
the report. "More surveillance does not necessarily lead to a higher  
level of societal security. Hence there must be a thorough examination  
of whether the resulting massive constraints on human rights are  
proportionate and justified."

Nokia Siemens says 90 of the systems are already being used around the  
world, although it hasn't specified which countries are using it. A  
spokesman for the company said, "We implement stringent safeguards to  
prevent misuse of such systems for unauthorised purposes. In all  
countries where we operate we do business strictly according to the  
Nokia Siemens Networks standard code of conduct and UN and EU export  
regulations."

Samdup argues that such systems should fall under government controls  
that are imposed on "dual-use" goods - systems that could be used both  
for civil and military purposes. Security technologies usually escape  
these controls. For example, the EU regulation on the export and  
transfer of dual-use technology does not include surveillance and  
intelligence technologies on the list of items that must be checked  
and authorised before they are exported to certain countries.

The problem is that surveillance technologies have developed so  
rapidly that they have outpaced developments in export controls, says  
Samdup. "In many cases politicians, policy-makers and human-rights  
organisations lack the technical expertise to adequately assess the  
impact that such technology could have when it is exported to  
repressive regimes."


More information about the Infowarrior mailing list