Most of the products that have found their way into the mass surveillance industry Spy Files compiled by WikiLeaks relate to criminal/security-based surveillance. Some, however, are presented as service tools, not just for network operators but for their customers to improve service.
Dan delaMare-Lion, our Virgil through this cyberhell, urged users to consider the benefits his company could provide for “Service Assurance”, enabling it to “identify network bottlenecks and avoid affecting user experience”.
That is, the more a service provider knows about what you are doing, the better the service they can provide. That’s the basis of the pitch from US company Dialogic, which like Qosmos and SS8 emphasises that online and mobile behaviour can be a key to identity but goes further and suggests behaviour can be a predictive tool for future user service demands — for example, by predicting whether a user will run out of credit during an important mobile phone call.
In this context, surveillance of everything you do online or via your mobile is a tool to predict what you’ll do in the future and anticipate what you’ll need from the company you use. In short, you benefit from the complete stripping of your privacy.
This is the same rationale behind the Carrier IQ keystroke-logging software embedded on HTC and Samsung-built Android phones that is now the subject of US Senate interest, with claims the software breaches US wiretap laws and, inevitably, lawsuits. “We measure and summarize performance of the device to assist Operators in delivering better service,” said Carrier IQ in a statement defending itself. “Our software makes your phone better by delivering intelligence on the performance of mobile devices and networks to help the Operators provide optimal service efficiency.”
Carrier IQ’s protestations of innocent intentions, however, are a little hard to take at face value given its initial reaction to the revelation of the software — it threatened legal action to silence researcher Trevor Eckhart and only backed off when the Electronic Frontier Foundation became involved.
The embedded nature of such systems in important. The cyber security industry argues that mechanisms to monitor customer usage must be embedded — they shouldn’t be purpose-built or bolt-on systems added to existing networks. Networks should be developed from the ground up with full surveillance in mind. Add-ons are “compromise solutions”, said Dan delaMare-Lyon, that are expensive and not future-proofed: “We have one underlying network. We need to be able to see the traffic on it for many reasons — multiple teams focus on service delivery, security, lawful intercept … In some cases, deep packet inspection and session reassembly is necessary.”
The problem with systems like Carrier IQ’s software, of course, is that users are entirely unaware of the means of maximising their “consumer experience”, and given no choice to opt out. Indeed, even if you know the software is on your phone, disabling or removing it requires expertise well beyond most consumers. This is the difference between, for example, providing personal information willingly to Facebook, and Facebook’s systematic invasion of user privacy without consent. If you’re stupid enough to furnish Facebook with personal data, that’s your decision as a consumer. But Facebook’s “like” button tracks users visiting other sites and stores data for up to three months — although the company, which has called for the end of online anonymity, insists it isn’t “tracking” users but merely using the information to serve users more targeted ads.
There it is again — making your user experience “better”. But that concept of “better” is a corporate one — companies seriously think giving you “more targeted ads” improves your life.
Last week, Facebook agreed to a settlement with the US Federal Trade Commission committing to stop misleading its users about the efficacy of its privacy settings and accepting regular government audits for two decades. Facebook had been routinely passing on customers’ private information to third parties without their consent. The FTC has also thrashed out privacy-related settlements with Google and Twitter over the last 12 months, although the Twitter issue related to the hacking of people’s Twitter accounts, not how Twitter was handling customer info.
So what is the Australian government doing about what looks like a relentless private sector onslaught on privacy, driven both by the security industry and by companies eager to “improve service quality”?
The most we’ve heard from the government on privacy is when Stephen Conroy railed at Google over its Streetview violations involving sniffing wifi signals — coincidentally at the same time as Google was criticising the internet filter proposal. Privacy Minister Brendan O’Connor did release an issues paper on establishing a right to privacy earlier this year, but that was aimed at the media in the wake of the UK phone-hacking affair rather than the cyber security industry.
We also have no understanding of what firms are being used by our security and intelligence agencies in their electronic interception programs. Knowing which firms are being used would at least give us an understanding of the sorts of products being used to eavesdrop on Australians.However, unlike other government departments, agencies like ASIO are not required to publicly identify significant contracts. Instead, MPs can request that ASIO brief them confidentially on whom they outsource to, or what contracts they enter into to purchase equipment and services. The public is not permitted to know what firms and equipment security agencies are using to undertake surveillance.
Indeed, far from moving to better protect Australians’ communications privacy, this government continues to propose to remove protections. Its cybercrime bill, which didn’t pass before parliament rose for the year, would enable foreign governments to obtain Australians’ traffic data. And the government continues to consider, in secret, a mandatory data retention law that would preserve all records of every Australian’s phone and online behaviour.
Governments are creating a permissive environment for systematic privacy breaches because they ultimately stand to benefit from systems that track online usage, profile behaviour and chip away at online anonymity. From the perspective of governments, the spectrum of privacy breaches — from cyber security companies spruiking “mass surveillance” of all internet traffic to social media companies accumulating data — provides a smorgasbord of opportunities to accumulate information.
It’s willful neglect, in which governments pick and choose those privacy breaches they regard as inappropriate and do nothing to regulate the rest, in effect giving it a menu of tools for its own use, in the knowledge that the private sector is working on issues like defeating online anonymity and behaviour recognition.
Don’t expect governments to do anything about a rampant cyber security industry any time soon.
For those concerned about their Android phone, please consider using Project Voodoo’s Simple Carrier Detector. Unlike another detector I saw promoted last night, this one is Open Source. Though, admittedly, I can’t seem to easily find where the source is so I should just say ‘claimed’ Open Source. Have pinged the developer on Twitter to ask. https://market.android.com/details?id=org.projectvoodoo.simplecarrieriqdetector
As a follow up to my previous comment, the new update for the Woolworths Android App seem incredibly permissive.
directly call phone numbers
Allows the application to call phone numbers without your intervention. Malicious applications may cause unexpected calls on your phone bill. Note that this does not allow the application to call emergency numbers.
retrieve running applications
Allows application to retrieve information about currently and recently running tasks. May allow malicious applications to discover private information about other applications.
As we say in the trade… WTF? Uninstalled.
As a followup to my followup to my original comment, the original comment’s stuck in Moderation ‘coz I linked to https market.android …. #crikeyfail
Followup to… followup… to… And the author’s got back to me. That’s service. Yeah, I’ll bugger off now.
You only have to look at the HB Gary’s programmers email for the formula:
Step 1 : Gather all the data
Step 2 : ???
Step 3 : Profit
… ironically he didn’t think this was a commerically viable business plan.
Oh and Bernard, you could add that the French Company “Amesys, which became a subsidiary of the Bull Group in 2010, does not deny selling a surveillance product to Libya, ordered in 2007 and supplied in 2008.” This allowed Gaddafi to keep tabs on dissidents.