Feeds

Total Poindexter Awareness: essential information

Americans bite back against the Panopticon

  • alert
  • submit to reddit

The essential guide to IT transformation

John Gilmore has picked up a call to give the government's snoopers and window-peepers a taste of their own medicine. His suggestion is at the top of MIT's Blogdex today, so it looks like it's already gaining some traction.

To illustrate the potential loss of privacy SF Weekly columnist Matt Smith called Admiral John Poindexter at home, and helpfully provided us with his address and telephone number, in a piece published here. The disgraced Iran Contra felon - who was convicted of conspiracy, obstruction, and lying to Congress and escaped a custodial sentence on a technicality - has been given the job of creating the largest dragnet of personal information ever devised. DARPA will forage for details of every American's email, phone communications and financial transactions.

The extent of Total Information Awareness was disclosed by the New York Times last month. When reporter John Markoff rang the Homeland Defense department, they hadn't heard of the plan. That's because Poindexter's "Information Awareness Office" - with the unfortunate choice of an all-seeing eye in a pyramid as its logo - reports to the Department of Defense.

"The database envisioned is of an unprecedented scale," the Information Awareness Office itself notes in its description of TIA.

DARPA created the Internet, and recently tried to destroy it - as this humdinger of a follow-up by Markoff explains.

Smith promised to"publish anything that readers can convincingly claim to have obtained legally".

Gilmore agrees:-

" Employees at various businesses and organizations such as airlines, credit card authorizers, rental-car agencies, shops, gyms, schools, tollbooths, garbage services, banks, taxis, honest civil servants and police officers, and restaurants could demonstrate denial of service to such targeted people.

"A simple "We won't serve YOUR KIND OF PEOPLE" would do, as was practiced on black people for many decades. More subtle forms of denial of service are possible, such as "You've been 'randomly' selected as a security risk, I'll have to insist that [some degrading thing happen to you]". Or merely, "I can't seem to get this credit card to work, sir, and those twenties certainly look counterfeit to me."

" People who associated closely with such a targeted individual, such as their families, relatives, friends, neighbors, protective secret service agents, and business associates, might find themselves swept up in the information dragnet.

"Such a demonstration would graphically reveal the societal dangers of deploying such systems on a wide scale against a large number of citizens -- preferably early enough that such a deployment could be prevented, rather than reversed after major harm was caused."

In Gilmore's view, that the real menace is that such a Panopticon works on the principle of GIGO: garbage in, garbage out. False information could be used to harass innocent citizens.

But the Panopticon - a prison in which the observers are concealed - derives its power from the asymmetry of knowledge, as Foucalt described it. They know much more about you than you know about them.

Perhaps that's what DARPA means when it refers to "asymmetric" technology.®

Related Links

Gilmore: Eyeballing TIA
Matt Smith: Calling All Yahoos
DARPA: TIA

Related Story

US gov's 'ultimate database' run by a felon
MS hires Iran Contra attorney

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
No, thank you. I will not code for the Caliphate
Some assignments, even the Bongster decline must
Barnes & Noble: Swallow a Samsung Nook tablet, please ... pretty please
Novelslab finally on sale with ($199 - $20) price tag
Mozilla's 'Tiles' ads debut in new Firefox nightlies
You can try turning them off and on again
Banking apps: Handy, can grab all your money... and RIDDLED with coding flaws
Yep, that one place you'd hoped you wouldn't find 'em
Video of US journalist 'beheading' pulled from social media
Yanked footage featured British-accented attacker and US journo James Foley
Primetime precrime? Minority Report TV series 'being developed'
I have to know. I have to find out what happened to my life
Netflix swallows yet another bitter pill, inks peering deal with TWC
Net neutrality crusader once again pays up for priority access
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.