Vous êtes sur la page 1sur 9

PART ONE

SURVEILLANCE

NATION Low-priced surveillance technologies will help


millions of consumers protect their property, plan their
commutes, and monitor their families.But as
these informal intelligence-gathering networks
overlap and invade our privacy, that very
security and convenience could evaporate.
By Dan Farmer and Charles C.Mann
I L LU S T R AT I O N S B Y B R I A N S TAU F F E R
34 TECHNOLOGY REVIEW April 2003 w w w. t e c h n o l o g y r e v i e w. c o m
R
oute 9 is an old two-lane highway that cuts across Massachusetts lance. According to a January report by J.P.
from Boston in the east to Pittsfield in the west. Near the small Freeman, a security market-research firm
in Newtown, CT, 26 million surveillance
city of Northampton, the highway crosses the wide Connecti- cameras have already been installed world-
cut River. The Calvin Coolidge Memorial Bridge, named after wide, and more than 11 million of them
the president who once served as Northampton’s mayor, is a are in the United States. In heavily moni-
major regional traffic link. When the state began a long-delayed and still- tored London, England, Hull University
criminologist Clive Norris has estimated,
ongoing reconstruction of the bridge in the summer of 2001, traffic the average person is filmed by more than
jams stretched for kilometers into the bucolic New England countryside. 300 cameras each day.
In a project aimed at alleviating about 130 kilometers away. As each The $150 million-a-year remote
drivers’ frustration, the University of license plate passes the second camera, the digital-surveillance-camera market will
Massachusetts Transportation Center, server ascertains the time difference grow, according to Freeman, at an
located in nearby Amherst, installed eight between the two readings. The average of annual clip of 40 to 50 percent for the
shoe-size digital surveillance cameras the travel durations of all successfully next 10 years. But astonishingly, other,
along the roads leading to the bridge. matched vehicles defines the likely travel nonvideo forms of monitoring will
Six are mounted on utility poles and the time for crossing the bridge at any given increase even faster. In a process that
roofs of local businesses. Made by Axis moment, and that information is posted mirrors the unplanned growth of the
Communications in Sweden, they are on the traffic watch Web page. Internet itself, thousands of personal,
connected to dial-up modems and trans- To local residents, the traffic data are commercial, medical, police, and gov-
mit images of the roadway before them to helpful, even vital: police use the infor- ernment databases and monitoring sys-
a Web page, which commuters can check mation to plan emergency routes. But as tems will intersect and entwine.
for congestion before tackling the road. the computers calculate traffic flow, they Ultimately, surveillance will become so
According to Dan Dulaski, the system’s are also making a record of all cars that ubiquitous, networked, and searchable
technical manager, running the entire cross the bridge—when they do so, their that unmonitored public space will effec-
webcam system—power, phone, and average speed, and (depending on light- tively cease to exist.
Internet fees—costs just $600 a month. ing and weather conditions) how many This prospect—what science fiction
The other two cameras in the people are in each car. writer David Brin calls “the transparent
Coolidge Bridge project are a little less Trying to avoid provoking privacy society”—may sound too distant to be
routine. Built by Computer Recognition fears, Keith Fallon, a Computer Recog- worth thinking about. But even the far-
Systems in Wokingham, England, with nition Systems project engineer, says, sighted Brin underestimated how quickly
high-quality lenses and fast shutter speeds “we’re not saving any of the informa- technological advances—more powerful
(1/10,000 second), they are designed to tion we capture. Everything is deleted microprocessors, faster network trans-
photograph every car and truck that immediately.” But the company could missions, larger hard drives, cheaper elec-
passes by. Located eight kilometers apart, change its mind and start saving the tronics, and more sophisticated and
at the ends of the zone of maximum traf- data at any time. No one on the road powerful software—would make univer-
fic congestion, the two cameras send would know. sal surveillance possible.
vehicle images to attached computers, The Coolidge Bridge is just one of It’s not all about Big Brother or Big
which use special character-recognition thousands of locations around the planet Business, either. Widespread electronic
software to decipher vehicle license plates. where citizens are crossing—willingly, scrutiny is usually denounced as a crea-
The license data go to a server at the more often than not—into a world of tion of political tyranny or corporate
company’s U.S. office in Cambridge, MA, networked, highly computerized surveil- greed. But the rise of omnipresent sur-

JOHN SOARES (CAMERAS); COURTESY OF DAN DULASKI (TRAFFIC IMAGES)

Road tools. Web-accessible video cameras installed near vidual cars crossing the bridge (middle) and send the images to
Northampton, MA, by the University of Massachusetts computers that isolate license plates and use machine vision
Transportation Center overlook the Calvin Coolidge Memorial algorithms to read the plate numbers (right). Once a plate has
Bridge on Route 9 (left). Two additional cameras photograph indi- passed both cameras, the car’s travel time is computed.

36 TECHNOLOGY REVIEW April 2003 w w w. t e c h n o l o g y r e v i e w. c o m


THE SURVEILLANCE AD-HOCRACY
Cheap pix. The hardware behind the

L
University of Massachusetts, Amherst’s
ast October deadly snipers terrorized
traffic cam network costs just $600 a month Washington, DC, and the surrounding
to run, says technical manager Dan Dulaski. suburbs, killing 10 people. For three
PHOTOGRAPH BY JOHN SOARES long weeks, law enforcement agents
seemed helpless to stop the murderers,
who struck at random and then vanished
into the area’s snarl of highways. Ulti-
mately, two alleged killers were arrested,
but only because their taunting messages
to the authorities had inadvertently pro-
vided clues to their identification.
In the not-too-distant future, accord-
ing to advocates of policing technolo-
gies, such unstoppable rampages may
become next to impossible, at least in
populous areas. By combining police
cameras with private camera networks
like that on Route 9, video coverage will
become so complete that any snipers
who waged an attack—and all the people
near the crime scene—would be trackable
from camera to camera until they could
be stopped and interrogated.
The unquestionable usefulness and
sheer affordability of these extensive
video-surveillance systems suggest that
they will propagate rapidly. But despite
the relentlessly increasing capabilities of
such systems, video monitoring is still but
a tiny part—less than 1 percent—of sur-
veillance overall, says Carl Botan, a
Purdue center researcher who has studied
this technology for 15 years.
veillance will be driven as much by ordi- toring may be beneficial in itself, at least Examples are legion. By 2006, for
nary citizens’ understandable—even for the people who put it in place, but the instance, law will require that every U.S.
laudatory—desires for security, control, collective result could be calamitous. cell phone be designed to report its pre-
and comfort as by the imperatives of busi- To begin with, surveillance data from cise location during a 911 call; wireless
ness and government. “Nanny cams,” multiple sources are being combined into carriers plan to use the same technology
global-positioning locators, police and large databases. For example, businesses to offer 24-hour location-based services,
home security networks, traffic jam moni- track employees’ car, computer, and tele- including tracking of people and vehicles.
tors, medical-device radio-frequency tags, phone use to evaluate their job perfor- To prevent children from wittingly or
small-business webcams: the list of moni- mance; similarly, the U.S. Defense unwittingly calling up porn sites, the
toring devices employed by and for aver- Department’s experimental Total Infor- Seattle company N2H2 provides Web
age Americans is already long, and it will mation Awareness project has announced filtering and monitoring services for
only become longer. Extensive surveil- plans to sift through information about 2,500 schools serving 16 million stu-
lance, in short, is coming into being millions of people to find data that iden- dents. More than a third of all large cor-
because people like and want it. tify criminals and terrorists. porations electronically review the
“Almost all of the pieces for a sur- But many of these merged pools of computer files used by their employees,
veillance society are already here,” says data are less reliable than small-scale, according to a recent American Man-
Gene Spafford, director of Purdue Uni- localized monitoring efforts; big databases agement Association survey. Seven of
versity’s Center for Education and are harder to comb for bad entries, and the 10 biggest supermarket chains use
Research in Information Assurance and their conclusions are far more difficult to discount cards to monitor customers’
Security. “It’s just a matter of assembling verify. In addition, the inescapable nature shopping habits: tailoring product offer-
them.” Unfortunately, he says, ubiqui- of surveillance can itself create alarm, ings to customers’ wishes is key to sur-
tous surveillance faces intractable social even among its beneficiaries. “Your little vival in that brutally competitive
and technological problems that could camera network may seem like a good business. And as part of a new, federally
well reduce its usefulness or even make it idea to you,” Spafford says. “Living with mandated tracking system, the three
dangerous. As a result, each type of moni- everyone else’s could be a nightmare.” major U.S. automobile manufacturers

w w w. t e c h n o l o g y r e v i e w. c o m TECHNOLOGY REVIEW April 2003 37


plan to put special radio transponders
known as radio frequency identification
tags in every tire sold in the nation. Far
exceeding congressional requirements,
according to a leader of the Automotive
Industry Action Group, an industry think
tank, the tags can be read on vehicles
going as fast as 160 kilometers per hour
from a distance of 4.5 meters.
Many if not most of today’s surveil-
lance networks were set up by govern-
ment and big business, but in years to
come individuals and small organizations
will set the pace of growth. Future sales of
Net-enabled surveillance cameras, in the
view of Fredrik Nilsson, Axis Communi-
cations’ director of business development,
will be driven by organizations that buy
more than eight but fewer than 30 cam-
eras—condo associations, church groups,
convenience store owners, parent-teacher
associations, and anyone else who might
like to check what is happening in one
BY 2023 LARGE ORGANIZATIONS WILL BE ABLE TO
place while he is sitting in another. A DEVOTE THE EQUIVALENT OF A CONTEMPORARY PC TO
dozen companies already help working
parents monitor their children’s nannies
MONITORING EVERY SINGLE ONE OF THE 330 MILLION
and day-care centers from the office; scores PEOPLE WHO WILL BE LIVING IN THE UNITED STATES.
more let them watch backyards, school
buses, playgrounds, and their own living Robert M. Wise, director of product mar- monitoring every single one of the 330
rooms. Two new startups—Wherify Wire- keting for the desktop product group at million people who will then be living in
less in Redwood Shores, CA, and Peace of Maxtor, a hard drive manufacturer. Simi- the United States.
Mind at Light Speed in Westport, CT—are larly, according to a 2001 study by a pair One of the first applications for this
introducing bracelets and other portable of AT&T Labs researchers, network trans- combination of surveillance and compu-
devices that continuously beam locating mission capacity has more than doubled tational power, says Raghu Ramakrishnan,
signals to satellites so that worried moms annually for the last dozen years, a ten- a database researcher at the University of
and dads can always find their children. dency that should continue for at least Wisconsin-Madison, will be continuous
As thousands of ordinary people buy another decade and will keep those pow- intensive monitoring of buildings, offices,
monitoring devices and services, the erful processors and hard drives well fed and stores: the spaces where middle-class
unplanned result will be an immense, with fresh data. people spend most of their lives. Surveil-
overlapping grid of surveillance systems, Today a company or agency with a lance in the workplace is common now: in
created unintentionally by the same ad- $10 million hardware budget can buy 2001, according to the American Man-
hocracy that caused the Internet to processing power equivalent to 2,000 agement Association survey, 77.7 percent
explode. Meanwhile, the computer net- workstations, two petabytes of hard drive of major U.S. corporations electronically
works on which monitoring data are space (two million gigabytes, or 50,000 monitored their employees, and that
stored and manipulated continue to grow standard 40-gigabyte hard drives like statistic had more than doubled since
faster, cheaper, smarter, and able to store those found on today’s PCs), and a two- 1997 (see “Eye on Employees,” p. 39). But
information in greater volume for longer gigabit Internet connection (more than much more is on the way. Companies
times. Ubiquitous digital surveillance 2,000 times the capacity of a typical home like Johnson Controls and Siemens,
will marry widespread computational broadband connection). If current trends Ramakrishnan says, are already “doing
power—with startling results. continue, simple arithmetic predicts that simplistic kinds of ‘asset tracking,’ as they
The factors driving the growth of in 20 years the same purchasing power call it.” They use radio frequency identi-
computing potential are well known. will buy the processing capability of 10 fication tags to monitor the locations of
Moore’s law—which roughly equates to million of today’s workstations, 200 people as well as inventory. In January,
the doubling of processor speed every 18 exabytes (200 million gigabytes) of stor- Gillette began attaching such tags to 500
months—seems likely to continue its age capacity, and 200 exabits (200 million million of its Mach 3 Turbo razors. Spe-
famous march. Hard drive capacity is ris- megabits) of bandwidth. Another way cial “smart shelves” at Wal-Mart stores
ing even faster. It has doubled every year of saying this is that by 2023 large orga- will record the removal of razors by shop-
for more than a decade, and this should go nizations will be able to devote the pers, thereby alerting stock clerks when-
on “as far as the eye can see,” according to equivalent of a contemporary PC to ever shelves need to be refilled—and

38 TECHNOLOGY REVIEW April 2003 w w w. t e c h n o l o g y r e v i e w. c o m


effectively transforming Gillette customers that he misinterpreted a crucial line, a dis- that analysts will use custom data-mining
into walking radio beacons. In the future, covery that leads directly to the movie’s techniques to sift through the mass of
such tags will be used by hospitals to chilling denouement. information, attempting to “detect, clas-
ensure that patients and staff maintain The Conversation illustrates a cen- sify, and identify foreign terrorists” in
quarantines, by law offices to keep visitors tral dilemma for tomorrow’s surveillance order to “preempt and defeat terrorist
from straying into rooms containing society. Although much of the explosive acts”—a virtual Eye of Sauron, in critics’
clients’ confidential papers, and in kinder- growth in monitoring is being driven by view, constructed from telephone bills
gartens to track toddlers. consumer demand, that growth has not and shopping preference cards.
By employing multiple, overlapping yet been accompanied by solutions to In February Congress required the
types of monitoring, Ramakrishnan says, the classic difficulties computer systems Pentagon to obtain its specific approval
managers will be able to “keep track of have integrating disparate sources of before implementing Total Information
people, objects, and environmental levels information and arriving at valid con- Awareness in the United States (though
throughout a whole complex.” Initially, clusions. Data quality problems that cause certain actions are allowed on foreign
these networks will be installed for “such little inconvenience on a local scale— soil). But President George W. Bush had
mundane things as trying to figure out when Wal-Mart’s smart shelves misread a already announced that he was creating
when to replace the carpets or which razor’s radio frequency identification an apparently similar effort, the Terrorist
areas of lawn get the most traffic so you tag—have much larger consequences Threat Integration Center, to be led by the
need to spread some grass seed preven- when organizations assemble big data- Central Intelligence Agency. Regardless of
tively.” But as computers and monitoring bases from many sources and attempt to the fate of these two programs, other
equipment become cheaper and more draw conclusions about, say, someone’s equally sweeping attempts to pool moni-
powerful, managers will use surveillance capacity for criminal action. Such prob- toring data are proceeding apace. Among
data to construct complex, multidimen- lems, in the long run, will play a large role these initiatives is Regulatory DataCorp,
sional records of how spaces are used. The in determining both the technical and a for-profit consortium of 19 top finan-
models will be analyzed to improve effi- social impact of surveillance. cial institutions worldwide. The consor-
ciency and security—and they will be The experimental and controversial tium, which was formed last July,
sold to other businesses or governments. Total Information Awareness program of combines members’ customer data in an
Over time, the thousands of individual the Defense Advanced Research Projects effort to combat “money laundering,
monitoring schemes inevitably will merge Agency exemplifies these issues. By merg- fraud, terrorist financing, organized
together and feed their data into large ing records from corporate, medical, retail, crime, and corruption.” By constantly
commercial and state-owned networks. educational, travel, telephone, and even poring through more than 20,000 sources
When surveillance databases can describe veterinary sources, as well as such “bio- of public information about potential
or depict what every individual is doing metric” data as fingerprints, iris and retina wrongdoings—from newspaper articles
at a particular time, Ramakrishnan says, scans, DNA tests, and facial-characteristic and Interpol warrants to disciplinary
they will be providing humankind with measurements, the program is intended to actions by the U.S. Securities and
the digital equivalent of an ancient dream: create an unprecedented repository of Exchange Commission—the consor-
being “present, in effect, almost anywhere information about both U.S. citizens and tium’s Global Regulatory Information
and anytime.” foreigners with U.S. contacts. Program Database will, according to its owner,
director John M. Poindexter has explained help clients “know their customers.”

GARBAGE IN, GRAGBEA OTU


Eye on Employees
I
n 1974 Francis Ford Coppola wrote
and directed The Conversation, which Percentage of major U.S. employers that record and review their workers’ activities
starred Gene Hackman as Harry Caul,
SURVEILLANCE ACTIVITY 1997 1998 1999 2000 2001
a socially maladroit surveillance expert. In
this remarkably prescient movie, a mys- Recording telephone conversations 10.4 11.2 10.6 11.5 11.9
terious organization hires Caul to record Monitoring telephone usage 34.4 40.2 38.6 44.0 43.3
a quiet discussion that will take place in
Storing and reviewing voice mail 5.3 5.3 5.8 6.8 7.8
the middle of a crowd in San Francisco’s
Union Square. Caul deploys three micro- Storing and reviewing computer files 13.7 19.6 21.4 30.8 36.1
phones: one in a bag carried by a con- Storing and reviewing e-mail 14.9 20.2 27.0 38.1 46.5
federate and two directional mikes
Monitoring Internet connections NA 1
NA 1
NA 1
54.1 62.8
installed on buildings overlooking the
SOURCE: AMERICAN MANAGEMENT ASSOCIATION

area. Afterward Caul discovers that each Clocking overall computer use 16.1 15.9 15.2 19.4 18.9
of the three recordings is plagued by Video recording of 15.7 15.6 16.1 14.6 15.2
background noise and distortions, but employee performance
by combining the different sources, he is Video surveillance for security 33.7 32.7 32.8 35.3 37.7
able to piece together the conversation.
Any active electronic monitoring 35.3 42.7 45.1 73.52 77.72
Or, rather, he thinks he has pieced it
together. Later, to his horror, Caul learns 1. NOT AVAILABLE. 2. INCLUDES INTERNET MONITORING, WHICH WAS NOT MEASURED PRIOR TO 2000.

w w w. t e c h n o l o g y r e v i e w. c o m TECHNOLOGY REVIEW April 2003 39


Equally important in the long run would require—only “a couple terabytes cery store customer cards—to say nothing
are the databases that will be created by of well-defined information” would be of the Internet, surely the world’s largest
the nearly spontaneous aggregation of needed, says Jeffrey Ullman, a former repository of personal information.
scores or hundreds of smaller databases. Stanford University database researcher. Unfortunately, all these sources are full of
“What seem to be small-scale, discrete “I don’t think that’s really stressing the errors, as are financial and medical
systems end up being combined into large capacity of [even today’s] databases.” records. Names are misspelled and digits
databases,” says Marc Rotenberg, executive Instead, argues Rajeev Motwani, transposed; address and e-mail records
director of the Electronic Privacy Infor- another member of Stanford’s database become outdated when people move and
mation Center, a nonprofit research orga- group, the real challenge for large sur- switch Internet service providers; and
nization in Washington, DC. He points to veillance databases will be the seemingly formatting differences among databases
the recent, voluntary efforts of merchants simple task of gathering valid data. Com- cause information loss and distortion
in Washington’s affluent Georgetown dis- puter scientists use the term GIGO— when they are merged. “It is routine to
trict. They are integrating their in-store garbage in, garbage out—to describe find in large customer databases defective
closed-circuit television networks and situations in which erroneous input cre- records—records with at least one major
error or omission—at rates of at least 20
ALREADY, 26 MILLION SURVEILLANCE CAMERAS HAVE to 35 percent,” says Larry English of Infor-
mation Impact, a database consulting
BEEN INSTALLED WORLDWIDE, AND 11 MILLION OF company in Brentwood, TN.
Unfortunately, says Motwani, “data
THEM ARE IN THE UNITED STATES. MORE AND MORE, cleaning is a major open problem in the
THE DATA FROM THESE CAMERAS ARE BEING POOLED. research community. We are still strug-
gling to get a formal technical definition
making the combined results available to ates erroneous output. Whether people are of the problem.” Even when the original
city police. In Rotenberg’s view, the col- building bombs or buying bagels, gov- data are correct, he argues, merging them
lection and consolidation of individual ernments and corporations try to pre- can introduce errors where none had
surveillance networks into big govern- dict their behavior by integrating data existed before. Worse, none of these wor-
ment and industry programs “is a strange from sources as disparate as electronic ries about the garbage going into the sys-
mix of public and private, and it’s not toll-collection sensors, library records, tem even begin to address the still larger
something that the legal system has restaurant credit-card receipts, and gro- problems with the garbage going out.
encountered much before.”
Managing the sheer size of these Cameras Canvass Times Square
aggregate surveillance databases, sur-
Eighth Ave.

Broadway

Seventh Ave.

Sixth Ave.

Fifth Ave.
prisingly, will not pose insurmountable
technical difficulties. Most personal data
50th St.
are either very compact or easily com-
pressible. Financial, medical, and shop-
ping records can be represented as strings 49th St.

of text that are easily stored and trans-

JOHN MACNEILL; SOURCES: BILL BROWN/SURVEILLANCE CAMERA PLAYERS; METROCOMMUTE; NEW YORK CITY DEPARTMENT OF TRANSPORTATION
mitted; as a general rule, the records do 48th St.
not grow substantially over time.
Even biometric records are no strain
on computing systems. To identify people, 47th St.

genetic-testing firms typically need


stretches of DNA that can be represented 46th St.
in just one kilobyte—the size of a short e-
mail message. Fingerprints, iris scans,
45th St.
and other types of biometric data con-
sume little more. Other forms of data
can be preprocessed in much the way 44th St.

that the cameras on Route 9 transform


multimegabyte images of cars into short 43rd St.
strings of text with license plate numbers
and times. (For investigators, having a
42nd St.
video of suspects driving down a road
usually is not as important as simply
People passing through Manhattan’s Times ■ METROCOMMUTE TRAFFIC CAMS
knowing that they were there at a given
Square area leave a trail of images on scores of
time.) To create a digital dossier for every ■ NEW YORK CITY DEPARTMENT OF
webcams and private and city-owned surveil-
individual in the United States—as pro- TRANSPORTATION TRAFFIC CAMS
lance cameras. New York privacy activist Bill
grams like Total Information Awareness Brown compiled this map in September 2002. ■ ALL OTHER CAMERAS

40 TECHNOLOGY REVIEW April 2003 w w w. t e c h n o l o g y r e v i e w. c o m


THE DISSOLUTION OF PRIVACY able to tap into a pervasive network of scattered sheaves of paper records (see

A
lmost every computer-science stu- surveillance cameras, they could have “Paperless Medicine,” p. 58).“The idea,” he
dent takes a course in algorithms. tracked people seen near the crime scenes says, “is that if you’re brought to an ER
Algorithms are sets of specified, until they could be stopped and ques- anywhere in the world, your medical
repeatable rules or procedures for accom- tioned: a reactive process. But it is unlikely records pop up in 30 seconds.” Similar
plishing tasks such as sorting numbers; that police would have been helped by programs are already coming into exis-
they are, so to speak, the engines that proactively asking surveillance databases tence. Backed by the Centers for Disease
make programs run. Unfortunately, inno- for the names of people in the Washing- Control and Prevention, a team based at
vations in algorithms are not subject to ton area with the requisite characteristics Harvard Medical School is planning to
Moore’s law, and progress in the field is (family difficulties, perhaps, or military monitor the records of 20 million walk-in
notoriously sporadic. “There are certain training and a recent penchant for drink- hospital patients throughout the United
areas in algorithms we basically can’t do ing) to become snipers. States for clusters of symptoms associ-
better and others where creative work In many cases, invalid answers are ated with bioterror agents. Given the huge
will have to be done,” Ullman says. Sifting harmless. If Victoria’s Secret mistakenly number of lost or confused medical
through large surveillance databases for mails 1 percent of its spring catalogs to records, the benefits of such plans are
information, he says, will essentially be “a people with no interest in lingerie, the clear. But because doctors would be con-
problem in research in algorithms. We price paid by all parties is small. But if a tinually adding information to medical
need to exploit some of the stuff that’s national terrorist-tracking system has histories, the system would be monitoring
been done in the data-mining community the same 1 percent error rate, it will pro- patients’ most intimate personal data. The
recently and do it much, much better.” duce millions of false alarms, wasting network, therefore, threatens to violate
Working with databases requires huge amounts of investigators’ time and, patient confidentiality on a global scale.
users to have two mental models. One is worse, labeling many innocent U.S. citi- In Shneiderman’s view, such trade-
offs are inherent to surveillance. The
IF A NATIONAL TERRORIST-TRACKING SYSTEM HAS collective by-product of thousands of
unexceptionable, even praiseworthy efforts
EVEN A 1 PERCENT ERROR RATE, IT WILL PRODUCE to gather data could be something nobody
wants: the demise of privacy. “These net-
MILLIONS OF FALSE ALARMS, WASTING TIME AND works are growing much faster than
LABELING INNOCENT U.S. CITIZENS AS SUSPECTS. people realize,” he says. “We need to pay
attention to what we’re doing right now.”
a model of the data. Teasing out answers zens as suspects. “A 99 percent hit rate is In The Conversation, surveillance
to questions from the popular search great for advertising,” Spafford says, “but expert Harry Caul is forced to confront the
engine Google, for example, is easier if terrible for spotting terrorism.” trade-offs of his profession directly. The
users grasp the varieties and types of Because no system can have a suc- conversation in Union Square provides
data on the Internet—Web pages with cess rate of 100 percent, analysts can try to information that he uses to try to stop a
words and pictures, whole documents in decrease the likelihood that surveillance murder. Unfortunately, his faulty inter-
a multiplicity of formats, downloadable databases will identify blameless people as pretation of its meaning prevents him
software and media files—and how they possible terrorists. By making the criteria from averting tragedy. Worse still, we see
are stored. In exactly the same way, for flagging suspects more stringent, offi- in scene after scene that even the expert
extracting information from surveillance cials can raise the bar, and fewer ordinary snoop is unable to avoid being moni-
databases will depend on a user’s knowl- citizens will be wrongly fingered. tored and recorded. At the movie’s intense,
edge of the system. “It’s a chess game,” Inevitably, however, that will mean also almost wordless climax, Caul rips his
Ullman says. “An unusually smart analyst that the “borderline” terrorists—those home apart in a futile effort to find the
will get things that a not-so-smart one who don’t match all the search criteria electronic bugs that are hounding him.
will not.” but still have lethal intentions—might be The Conversation foreshadowed a view
Second, and more important accord- overlooked as well. For both types of error, now taken by many experts: surveillance
ing to Spafford, effective use of big sur- the potential consequences are alarming. cannot be stopped. There is no possibility
veillance databases will depend on having Yet none of these concerns will stop of “opting out.” The question instead is
a model of what one is looking for. This the growth of surveillance, says Ben how to use technology, policy, and shared
factor is especially crucial, he says, when Shneiderman, a computer scientist at the societal values to guide the spread of sur-
trying to predict the future, a goal of University of Maryland. Its potential bene- veillance—by the government, by corpo-
many commercial and government proj- fits are simply too large. An example is rations, and perhaps most of all by our
ects. For this reason, what might be called what Shneiderman, in his recent book own unwitting and enthusiastic partici-
reactive searches that scan recorded data Leonardo’s Laptop: Human Needs and the pation—while limiting its downside. ◊
for specific patterns are generally much New Computing Technologies, calls the
more likely to obtain useful answers than World Wide Med: a global, unified data- Next month: how surveillance technology
proactive searches that seek to get ahead base that makes every patient’s complete is changing our definition of privacy—
of things. If, for instance, police in the medical history instantly available to doc- and why the keys to preserving it may be in
Washington sniper investigation had been tors through the Internet, replacing today’s the technology itself.

w w w. t e c h n o l o g y r e v i e w. c o m TECHNOLOGY REVIEW April 2003 43

Vous aimerez peut-être aussi