Means of control How the hidden alliance of tech and government is creating a new American surveillance state

Byron Tau

Book - 2024

"A sweeping exposé of the U.S. government's alliance with data brokers, tech companies, and advertisers, and how their efforts are reshaping surveillance and privacy as we know it. Our modern world is awash in surveillance. Most of us are dimly aware of this-ever get the sense that an ad is "following" you around the internet?-but we don't understand the extent to which the technology embedded in our phones, computers, cars, and homes is part of a vast ecosystem of data collection. Our public spaces are blanketed by cameras put up in the name of security. And pretty much everything that emits a wireless signal of any kind-routers, televisions, Bluetooth devices, chip-enabled credit cards, even the tires of every ca...r manufactured since the mid-2000s-can be and often is covertly monitored. All of this surveillance has produced an extraordinary amount of data about every citizen-and the biggest customer is the U.S. government. Reporter Byron Tau has been digging deep inside the growing alliance between business, tech, and government for years, piecing together a secret story: how the whole of the internet and every digital device in the world have become a mechanism of intelligence, surveillance, and monitoring. Tau traces the unlikely tale of how the government came to view commercial data as a principal asset of national security in the years after 9/11, working with scores of anonymous companies, many scattered across bland Northern Virginia suburbs, to build a foreign and domestic surveillance capacity of such breathtaking scope that it could peer into the lives of nearly everyone on the planet. The result is a cottage industry of data brokers and government bureaucrats with one directive-"get everything you can"-and, as Tau observes, a darkly humorous world in which defense contractors have marketing subsidiaries, and marketing companies have defense contractor subsidiaries. Sobering and revelatory, Means of Control is our era's defining story of the dangerous grand bargain we've made: ubiquitous, often cheap technology, but at what price to our privacy?"--

Saved in:

2nd Floor Show me where

323.4482/Tau
1 / 1 copies available
Location Call Number   Status
2nd Floor 323.4482/Tau Checked In
Subjects
Published
New York, NY : Crown [2024]
Language
English
Main Author
Byron Tau (author)
Edition
First edition
Physical Description
xxvii, 368 pages ; 25 cm
Bibliography
Includes bibliographical references (pages 315-349) and index.
ISBN
9780593443224
  • Author's Note
  • Introduction-The Grindr Problem and a Wine-Soaked Dinner
  • Part I. Signatures
  • Chapter 1. The Bad Guys Database
  • Ghapter 2. The Supersnoop's Dream
  • Chapter 3. The Gordian Knot
  • Chapter 4. Electronic Footprints
  • Chapter 5. The Dots Guys
  • Part II. A New Nervous System
  • Chapter B. The Firehose
  • Chapter 7. The Ugly Stepchild
  • Chapter 8. The Berber Hunter
  • Chapter 9. Decipher Your World
  • Chapter 10. The Network of Death
  • Chapter 11. Like a Real Person
  • Part III. Exhaust
  • Chapter 12. They Know How Bad You Are at Angry Birds
  • Chapter 13. Location and Motive
  • Chapter 14. Where You Go Is Who You Are
  • Chapter 15. The Fun House of Mirrors
  • Chapter 16. Success Lies in the Secrecy
  • Part IV. Gray Data
  • Chapter 17. Going Gray
  • Chapter 18. We're All Signal Collectors Now
  • Chapter 19. Mini-spies
  • Chapter 20. Rhamnousia, the Goddess Who Punishes Hubris
  • Chapter 21. The Apps Are Not What They Seem
  • Chapter 22. The Privilege of Disappearing
  • Epilogue-The Man Behind the Counter
  • Acknowledgments
  • Appendix-An Ordinary Person's Guide to Digital Privacy
  • Key Concepts and Definitions
  • Notes
  • Index
Review by Publisher's Weekly Review

Journalist Tau debuts with a chilling chronicle of how data collection efforts by corporate and government entities have created a "digital panopticon." In the weeks after 9/11, data broker Acxiom realized the information it collected on credit card purchases and places of residence, intended to inform targeted advertising, could also be used to recreate the movements of the attackers. The company teamed up with the U.S. government, kickstarting the latter's attempts to build up its own data mining efforts, with help from private contractors. Tau offers novelistic accounts of this and other major milestones in the erosion of data privacy. For instance, he explains that when National Geospatial-Intelligence Agency analyst Katie Zezima mapped calls for help on Twitter to pinpoint areas in peril following the 2011 earthquake in Japan, she led one of the first government initiatives to draw "actionable information" from social media, raising legal questions that bureaucrats swept aside after realizing the data's utility. Other stories are even more alarming, such as the use of social media by police in Ferguson, Mo., to monitor racial justice protestors in 2014 and the NSA's breaking into Google's network despite the company's compliance with government investigations. Filled with shocking revelations and first-rate reporting, this will have readers thinking twice before they post. Agent: Eric Lupfer, UTA. (Feb.)

(c) Copyright PWxyz, LLC. All rights reserved
Review by Kirkus Book Review

A revealing examination of how government and corporate collaborations have eroded our privacy. Over the last two decades, the data trails we all create every day have been followed with increasing sophistication by big business and government authorities, who now often work together. Unless we take unusual measures to protect ourselves, both our online and offline behavior is thoroughly recorded by data-harvesters. Not only surfing the internet, but simply walking or driving from place to place while carrying a smartphone can expose us to detailed tracking. The collection of such data is immensely useful to advertisers interested in understanding and exploiting consumer preferences; it's also tempting to government agencies seeking to deliver public services more efficiently and managing ostensible security threats. As investigative reporter Tau explains in this startling book, the result is that our privacy is routinely and profoundly compromised, with threats to civil liberties accelerating at an alarming pace. The author argues persuasively that the U.S. is "trending discomfortingly in the same general direction" as authoritarian China, where state authorities now exercise powers that rival those imagined by Orwell. Tau's explanations of how surveillance techniques have evolved in the 21st century in response to the trauma of 9/11--and how they might yet be put to use in ordinary circumstance--are exceptionally clear and unsettling. He rightly points out that the special vulnerability of racial and religious minorities to surveillance and harassment has already been demonstrated. The author also compellingly shows why governments are attracted to "big data" and how difficult it will be to balance its legitimate use by government powers with concerns about the protection of civil liberties. This timely book carries a crucial message about the stakes involved in government-corporate partnerships. A fascinating, sometimes terrifying examination of the decline of privacy in the digital age. Copyright (c) Kirkus Reviews, used with permission.

Copyright (c) Kirkus Reviews, used with permission.

Chapter 1 The Bad Guys Database Acxiom, Arkansas and Washington, D.C., 2001 It was a crisp New England morning when Acxiom consumer No. 254-04907-10006 cleared the security checkpoint at Boston's Logan Airport. Consumer No. 254-04907-10006 was a twenty-two-year-old Saudi national named Waleed al-Shehri. He was of slight stature and pale complexion and had been in the United States for only about five months on a tourist visa. But he had generated enough of a paper trail to be captured and indexed by Acxiom, which at the time was the world's largest consumer data repository, holding billions of records on consumers drawn from corporate America as well as public records like court filings, voter registrations, and property deeds. In his twenty weeks in America, al-Shehri had been busy. He had obtained two copies of the same Florida driver's license (A426-893-78-460-0) with slightly mismatching addresses, giving him a duplicate that he could pass to an associate. He opened a bank account at SunTrust Bank in Florida (account number 0385008119775 linked to Visa debit card 4011 8060 7079 6163) and bought, insured, and then sold a 1993 Dodge Colt. He had bounced around motels and apartment complexes for weeks, generating even more records. The Bimini Motel and Apartments in Hollywood, Florida. Lago Mar Motel in Lake Worth. The Homing Inn in Boynton Beach. Lisa Motel and Apartment in Lake Worth. The DoubleTree in Lake Buena Vista. He'd availed himself of a number of services: a membership to the Body Perfect Fitness Center in Lake Worth and later the World Gym in Lantana. A Mail Boxes Etc. rental. He traveled extensively: to Freeport in the Bahamas, to Boston, to San Francisco, to Las Vegas. He made reservations at the Bahamas Princess Resort. Finally, he flew to the Boston area, where he checked into the 144-room Park Inn in Newton, Massachusetts, a leafy upscale suburb just outside the city. Six days later, he and the two men he'd been sharing a room with--his older brother Wail al-Shehri and a Saudi law school dropout named Satam al-Suqami--checked out of the motel. The trio headed for Boston Logan International Airport. Corporate data banks were not the only computer systems to take note of al-Shehri. Somewhere in a database called the Computer-Assisted Passenger Prescreening System, or CAPPS, al-Shehri was flagged for additional screening as he made his way to his gate because something about his travel pattern had set off the system. However, under the security procedures in place at the time, additional screening applied only to checked luggage--not carry-on. Because al-Shehri had no checked bags, he cleared the security checkpoint without issue. The metal detectors at the time were calibrated to detect the metal content of a .22-caliber handgun, not blades like what the men were carrying. (Knives and other blades under four inches were permitted under the theory that they could not pose any serious danger if wielded as a weapon.) Tucked away in yet another federal computer system run by the U.S. Immigration and Naturalization Service were other unusual records: U.S. government travel and visa files that showed al-Shehri shouldn't even be in the country. He and al-Suqami had tried to visit the Bahamas a few weeks after al-Shehri arrived in America. They flew out of Miami, handing in their U.S.-government-issued travel authorizations. But once in Freeport, Bahamian authorities turned them away over their lack of visas, and they were forced to board the next flight back to the United States. Under U.S. law, they had never left America because they had never legally entered the Bahamas. But their reentry into the United States was never logged by the immigration computer systems. Their aborted trip to the Bahamas was shown as an exit. As far as the U.S. government was aware, neither of the two men strolling through Logan's Terminal B were in the country at all. At Logan Airport, the al-Shehri brothers and al-Suqami took their seats in business class of American Airlines Flight 11, offering nonstop service from Boston to Los Angeles. They were joined on that flight by two other associates: Mohamed Atta and Abdul Aziz al-Omari, both of whom had flown in from Portland, Maine, earlier that morning. About fifteen minutes into the flight, the five men sprang into action--stabbing two flight attendants, slashing the throat of a passenger in first class, and spraying a chemical irritant at the front of the plane to force the passengers and crew to the rear. As the plane passed near Albany, New York, the five hijackers had firmly established control. With Atta at the controls, they turned the Boeing 767 south toward New York City. Perhaps unfamiliar with the in-flight address system and intending to address the passengers and crew of Flight 11, Atta barked from the cockpit, "We have some planes. Just stay quiet, and you'll be okay. We are returning to the airport. . . . ​Nobody move. Everything will be okay. If you try to make any moves, you'll endanger yourself and the airplane. Just stay quiet." But he transmitted it not over the intercom in the cabin but out over the plane's external radio to other pilots and air traffic controllers--a chilling warning to the rest of the world that something was not right in the skies that September morning. Why had none of the systems in place stopped them? It was a failure to connect the dots. The government had plenty of information, but it had failed to adequately capitalize on the disparate intelligence leads and anomalies in the data that already existed. The FBI knew, in the summer of 2001, that two of the hijackers, Khalid al-Mihdhar and Nawaf al-Hazmi, were al-Qaeda operatives who had entered the United States in January 2000. The bureau was actively hunting for al-Mihdhar in the days before al-Shehri and his associates destroyed the North Tower of the World Trade Center and left a gaping hole in the side of the Pentagon--scouring the country to see if al-Mihdhar was still there and to determine what his intentions were. In fact, all summer long U.S. intelligence had been picking up vague and unspecific terrorist "chatter" warning of an unspecified threat to the homeland. President Bush's August 6, 2001, daily intelligence briefing contained an item titled "Bin Ladin Determined to Strike in US." That was the thirty-sixth time bin Laden or his al-Qaeda terrorist group had been mentioned in a presidential briefing in 2001. There was a memo from the Phoenix FBI field office, where an agent named Kenneth Williams warned in July that he believed the terrorist leader Osama bin Laden was trying to dispatch students to flight training in the United States. There was an FAA warning that same month of "reports of possible near-term terrorist operations" and ongoing threats against civil aviation, including the threat of hijacking. As the CIA director, George Tenet, later told the 9/11 Commission assembled to investigate the attacks about the increasingly dire intelligence warnings piled up on the desks of national security officials in the summer of 2001, "The system was blinking red." September 11 taught us something else, too: namely that data valuable in understanding the attacks wasn't just hidden in government databases. In corporate America's vast and growing collection of consumer data, there were patterns of bizarre behavior, unusual rentals, confounding address histories, and duplicate licenses. These were all potential signals to law enforcement or the intelligence community that something was potentially amiss--if only law enforcement had bothered to look. In the wake of the attack, the FBI put together a detailed chronology with 3,441 total entries chronicling the steps the hijackers had taken in their planning--bank transactions, travel records, hotel stays, gym check-ins, visa applications, and credit and debit card transactions that told the story of the attacks, from the date of the eldest hijacker Mohamed Atta's birth in September 1968 to a handwritten letter the FBI found in a mailbox rented by some of the Florida-based hijackers, dated September 10, 2001, with a message to one of the hijackers: "Hammza, whatever you do, do not tell anyone what you are about to do tomorrow. Okay?" It was a chillingly detailed look at the years of planning that went into carrying out the attacks, much of it drawn from records maintained by corporate America. And as the government soon found out, corporate America was eager to help. At the heart of this story is a kind of company that few Americans give much thought to: data brokers. Beginning in the 1960s, these data warehousers sprang up to help America's largest corporations advertise more efficiently. At first, these brokers were collecting fairly basic information: address history and some simple demographics. But as computers grew more powerful and digital storage grew cheaper, so did the capacity to collect and collate huge volumes of information and derive increasingly personalized insights from that data. Data brokers emerged to cater to advertisers' demands for more and more detailed information on all of us. Excerpted from Means of Control: How the Hidden Alliance of Tech and Government Is Creating a New American Surveillance State by Byron Tau All rights reserved by the original copyright owners. Excerpts are provided for display purposes only and may not be reproduced, reprinted or distributed without the written permission of the publisher.