Metadata Liberation Movement


Holman Jenkins in the Wall Street Journal: “The biggest problem, then, with metadata surveillance may simply be that the wrong agencies are in charge of it. One particular reason why this matters is that the potential of metadata surveillance might actually be quite large but is being squandered by secret agencies whose narrow interest is only looking for terrorists….
“Big data” is only as good as the algorithms used to find out things worth finding out. The efficacy and refinement of big-data techniques are advanced by repetition, by giving more chances to find something worth knowing. Bringing metadata out of its black box wouldn’t only be a way to improve public trust in what government is doing. It would be a way to get more real value for society out of techniques that are being squandered on a fairly minor threat.
Bringing metadata out of the black box would open up new worlds of possibility—from anticipating traffic jams to locating missing persons after a disaster. It would also create an opportunity to make big data more consistent with the constitutional prohibition of unwarranted search and seizure. In the first instance, with the computer withholding identifying details of the individuals involved, any red flag could be examined by a law-enforcement officer to see, based on accumulated experience, whether the indication is of interest.
If so, a warrant could be obtained to expose the identities involved. If not, the record could immediately be expunged. All this could take place in a reasonably aboveboard, legal fashion, open to inspection in court when and if charges are brought or—this would be a good idea—a court is informed of investigations that led to no action.
Our guess is that big data techniques would pop up way too many false positives at first, and only considerable learning and practice would allow such techniques to become a useful tool. At the same time, bringing metadata surveillance out of the shadows would help the Googles, Verizons and Facebooks defend themselves from a wholly unwarranted suspicion that user privacy is somehow better protected by French or British or (heavens) Chinese companies from their own governments than U.S. data is from the U.S. government.
Most of all, it would allow these techniques to be put to work on solving problems that are actual problems for most Americans, which terrorism isn’t.”

Predictive Policing: Don’t even think about it


The Economist: “PredPol is one of a range of tools using better data, more finely crunched, to predict crime. They seem to promise better law-enforcement. But they also bring worries about privacy, and of justice systems run by machines not people.
Criminal offences, like infectious disease, form patterns in time and space. A burglary in a placid neighbourhood represents a heightened risk to surrounding properties; the threat shrinks swiftly if no further offences take place. These patterns have spawned a handful of predictive products which seem to offer real insight. During a four-month trial in Kent, 8.5% of all street crime occurred within PredPol’s pink boxes, with plenty more next door to them; predictions from police analysts scored only 5%. An earlier trial in Los Angeles saw the machine score 6% compared with human analysts’ 3%.
Intelligent policing can convert these modest gains into significant reductions in crime…
Predicting and forestalling crime does not solve its root causes. Positioning police in hotspots discourages opportunistic wrongdoing, but may encourage other criminals to move to less likely areas. And while data-crunching may make it easier to identify high-risk offenders—about half of American states use some form of statistical analysis to decide when to parole prisoners—there is little that it can do to change their motivation.
Misuse and overuse of data can amplify biases…But mathematical models might make policing more equitable by curbing prejudice.”

How algorithms rule the world


in The Guardian: “From dating websites and City trading floors, through to online retailing and internet searches (Google’s search algorithm is now a more closely guarded commercial secret than the recipe for Coca-Cola), algorithms are increasingly determining our collective futures. “Bank approvals, store cards, job matches and more all run on similar principles,” says Ball. “The algorithm is the god from the machine powering them all, for good or ill.”…The idea that the world’s financial markets – and, hence, the wellbeing of our pensions, shareholdings, savings etc – are now largely determined by algorithmic vagaries is unsettling enough for some. But, as the NSA revelations exposed, the bigger questions surrounding algorithms centre on governance and privacy. How are they being used to access and interpret “our” data? And by whom?”

It’s Time to Rewrite the Internet to Give Us Better Privacy, and Security


Larry Lessig in The Daily Beast: “Almost 15 years ago, as I was just finishing a book about the relationship between the Net (we called it “cyberspace” then) and civil liberties, a few ideas seemed so obvious as to be banal: First, life would move to the Net. Second, the Net would change as it did so. Gone would be simple privacy, the relatively anonymous default infrastructure for unmonitored communication; in its place would be a perpetually monitored, perfectly traceable system supporting both commerce and the government. That, at least, was the future that then seemed most likely, as business raced to make commerce possible and government scrambled to protect us (or our kids) from pornographers, and then pirates, and now terrorists.

But another future was also possible, and this was my third, and only important point: Recognizing these obvious trends, we just might get smart about how code (my shorthand for the technology of the Internet) regulates us, and just possibly might begin thinking smartly about how we could embed in that code the protections that the Constitution guarantees us. Because—and here was the punchline, the single slogan that all 724 people who read that book remember—code is law. And if code is law, then we need to be as smart about how code regulates us as we are about how the law does so….
But what astonishes me is that today, more than a decade into the 21st century, the world has remained mostly oblivious to these obvious points about the relationship between law and code….
the fact is that there is technology that could be deployed that would give many the confidence that none of us now have. “Trust us” does not compute. But trust and verify, with high-quality encryption, could. And there are companies, such as Palantir, developing technologies that could give us, and more importantly, reviewing courts, a very high level of confidence that data collected or surveilled was not collected or used in an improper way. Think of it as a massive audit log, recording how and who used what data for what purpose. We could code the Net in a string of obvious ways to give us even better privacy, while also enabling better security.

The Future of Internet Governance: 90 Places to Start


Council on Foreign Relations Blog: “The open, global Internet, which has created untold wealth and empowered billions of individuals, is in jeopardy. Around the world, “nations are reasserting sovereignty and territorializing cyberspace” to better control the political, economic, social activities of their citizens, and the content they can access. These top-down efforts undermine the Internet’s existing decentralized, multi-stakeholder system of governance and threaten its fragmentation into multiple national intranets. To preserve an open system that reflects its interests and values while remaining both secure and resilient, the United States must unite a coalition of like-minded states committed to free expression and free markets and prepared to embrace new strategies to combat cyber crime and rules to govern cyber warfare.
These are the core messages of the just-released CFR report, Defending an Open, Global, Resilient, and Secure Internet. The product of a high-level task force, chaired by former Director of National Intelligence John D. Negroponte and former IBM Chairman Samuel J. Palmisano, the report opens by describing the epochal transformation the Internet has wrought on societies and economies worldwide—particularly in the developing world.
Facilitating this unprecedented connectivity has been a framework based not on governmental (or intergovernmental) fiat but on “self-regulation, private sector leadership, and a bottom-up policy process.” By leaving regulation in the hands of technical experts, private sector actors, civil society groups, and end-users, the pioneers of the early Internet ensured that it would “reflect a broad range of perspectives and keep pace with rapidly changing technology.” They also ensured that rights of free expression and privacy would emerge as dominant norms….
Given current trends, can the United States possibly preserve the open global internet? Yes, but the first step is getting its own house in order. Distressingly, the U.S. government lacks a coherent strategic vision, an adequate policy coordination framework, and the requisite legislative authorities to develop and implement a national cyberspace policy, undercutting its global leadership.
Beyond this general guidance, the CFR task force offers some ninety (!) recommendations for U.S. policymakers.”

The Dictatorship of Data


Kenneth Cukier and Viktor Mayer-Schönberger in MIT Technology Review: “Big data is poised to transform society, from how we diagnose illness to how we educate children, even making it possible for a car to drive itself. Information is emerging as a new economic input, a vital resource. Companies, governments, and even individuals will be measuring and optimizing everything possible.
But there is a dark side. Big data erodes privacy. And when it is used to make predictions about what we are likely to do but haven’t yet done, it threatens freedom as well. Yet big data also exacerbates a very old problem: relying on the numbers when they are far more fallible than we think. Nothing underscores the consequences of data analysis gone awry more than the story of Robert McNamara.”

"A bite of me"


Federico Zannier @ Kickstarter: “I’ve data mined myself. I’ve violated my own privacy. Now I am selling it all. But how much am I worth?

I spend hours every day surfing the internet. Meanwhile, companies like Facebook and Google have been using my online information (the websites I visit, the friends I have, the videos I watch) for their own benefit.
In 2012, advertising revenue in the United States was around $30 billion. That same year, I made exactly $0 from my own data. But what if I tracked everything myself? Could I at least make a couple bucks back?
I started looking at the terms of service for the websites I often use. In their privacy policies, I have found sentences like this: “You grant a worldwide, non-exclusive, royalty-free license to use, copy, reproduce, process, adapt, modify, publish, transmit, display and distribute such content in any and all media or distribution methods (now known or later developed).” I’ve basically agreed to give away a lifelong, international, sub-licensable right to use my personal data….
Check out myprivacy.info to see some of the visualizations I’ve made.
http://myprivacy.info”

If My Data Is an Open Book, Why Can’t I Read It?


Natasha Singer in the New York Times: “Never mind all the hoopla about the presumed benefits of an “open data” society. In our day-to-day lives, many of us are being kept in the data dark.

“The fact that I am producing data and companies are collecting it to monetize it, if I can’t get a copy myself, I do consider it unfair,” says Latanya Sweeney, the director of the Data Privacy Lab at Harvard, where she is a professor of government and technology….

In fact, a few companies are challenging the norm of corporate data hoarding by actually sharing some information with the customers who generate it — and offering tools to put it to use. It’s a small but provocative trend in the United States, where only a handful of industries, like health care and credit, are required by federal law to provide people with access to their records.

Last year, San Diego Gas and Electric, a utility, introduced an online energy management program in which customers can view their electricity use in monthly, daily or hourly increments. There is even a practical benefit: customers can earn credits by reducing energy consumption during peak hours….

Digital Strategy: Delivering Better Results for the Public


The White House Blog: “Today marks one year since we released the Digital Government Strategy (PDF/ HTML5), as part of the President’s directive to build a 21st Century Government that delivers better services to the American people.
The Strategy is built on the proposition that all Americans should be able to access information from their Government anywhere, anytime, and on any device; that open government data – data that are publicly accessible in easy-to-use formats – can fuel innovation and economic growth; and that technology can make government more transparent, more efficient, and more effective.
A year later, there’s a lot to be proud of:
Information Centric
In twelve months, the Federal Government has significantly shifted how it thinks about digital information – treating data as a valuable national asset that should be open and available to the public, to entrepreneurs, and others, instead of keeping it trapped in government systems. …
Shared Platform
The Federal Government and the American people cannot afford to have each agency build isolated and duplicative technology solutions. Instead, we must use modern platforms for digital services that can be shared across agencies….
Customer-Centric
Citizens shouldn’t have to struggle to access the information they need. To ensure that the American people can easily find government services, we implemented a government-wide Digital Analytics Program across all Federal websites….
Security and Privacy
Throughout all of these efforts, maintaining cyber security and protecting privacy have been paramount….
In the end, the digital strategy is all about connecting people to government resources in useful ways. And by “connecting” we mean a two-way street….
Learn more at: http://www.whitehouse.gov/digitalgov/strategy-milestones and http://www.whitehouse.gov/digitalgov/deliverables.”