Feeds

Snowden's Big Brother isn't as Orwellian as you'd think

Secrets & lies: Spies & GCHQ

Maximizing your infrastructure through virtualization

Snowden Anniversary Few will forget learning the truth about Santa Claus. Many also felt deep shock on realising that a hitherto ultra-secret NSA/GCHQ programme, revealed in documents leaked by whistleblower Edward Snowden, was constantly rating everyone on a naughty-nice metric based on indiscriminate covert surveillance all their online activity – or that GCHQ’s “Cheltenham Doughnut” HQ was shaped like an enormous hard disc for a reason.

A year after the first Snowden revelations – or rather, after a year of Snowden revelations – we know that our surveillance agencies get hold of as much digital material as they can, doing so in some ways that are morally dubious although apparently inside the law… then apparently use only tiny pieces of what they gather.

Take Optic Nerve, the programme through which GCHQ captured and stored still images in bulk from millions of Yahoo! users’ webcam chats, revealed in February. Yahoo! called this “a whole new level of violation of our users’ privacy”.

But it is worth looking at the detail. The leaked page from GCHQ’s internal wiki noted it was trying to use facial recognition to find footage of specific targets, who it thought were using the Yahoo! system; that it stored still images every five minutes, rather than video footage, to comply with human rights legislation; and that it tried to filter out pornographic images, as well as allowing staff who felt uncomfortable about what they might see to opt out of opening Optic Nerve material.

“You are reminded that under GCHQ’s offensive material policy, the dissemination of offensive material is a disciplinary offence,” the page added. This is an organisation talking to itself, in what it thinks is a secret document. Yet it sounds less like an arm of a Shadow Government than a shadowy arm of the civil service.

Snowden documents have revealed some abuse, such as NSA operatives snooping on romantic partners and potential lovers, which the US agency then admitted. "Loveint" abuse is hardly restricted to secret agencies, with 76 London cops being investigated for alleged misuse of the Police National Computer between 2009 and 2013. A document from the NSA argued the case for leaking six radical Muslims’ penchant for online porn and underage girls; it didn’t say whether the agency went through with the plans.

But overall, the Snowden files have been long on capabilities and short on misuse. If you want both, go back 30 years, when a civil servant in London started writing a diary about his hatred of the government. Influenced by a new girlfriend, he got involved in radical politics, pledging to commit acts of terrorism in order to advance the cause. But before he got that far his diary was read, and he was betrayed, imprisoned and tortured.

Winston Smith did not exist. He was told this while in captivity; as part of his punishment he was erased from the official record. But he never existed in the first place, because he was a character in a novel. Nineteen Eighty Four may have been written by a journalist and set in a lightly fictionalised version of 1940s London, but it is fiction. Sixty-five years after its publication in 1949, and 30 years after the time period it was set in, the point still needs to be made that, despite an excrescence of surveillance cameras and the excesses of security services, the London of George Orwell’s masterpiece was not in place by 1984, and it isn’t now.

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
Disaster Recovery upstart joins DR 'as a service' gang
Quorum joins the aaS crowd with DRaaS offering
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.