She thought she was covering her tracks. But in the age of frictionless surveillance, Big Brother can't be stopped
The funny thing is, Paula Broadwell and David Petraeus thought they knew what they were doing. They were careful, more careful than the average American fooling around outside the bounds of marriage tends to be. When Broadwell wanted to warn off the other woman she suspected of messing with her man, she set up an anonymous email account and only used it away from home, usually on the Wi-Fi networks of hotels she was staying in. Broadwell and Petraeus also thought they could avoid having their emails intercepted in transit by technically avoiding “sending” them at all. Instead, they saved their messages to each other as “drafts” in a Gmail account to which they both enjoyed access.
But if they thought they were being smart, they were wrong. Broadwell and Petraeus were undone, says ACLU privacy and technology expert Christopher Soghoian, by their “lack of knowledge of operational security” and “poor tradecraft.” “Draft” messages are stored in Gmail’s server cloud just like all other sent and received messages. And the FBI turned out to be more than capable of correlating the Internet Protocol addresses that identified the origin of Broadwell’s supposedly “anonymous” emails with hotel records that showed Broadwell as a guest at the same time the messages were sent.
If Broadwell had taken greater precautions, she might never have been caught. She could have covered her tracks with any one of myriad commercially available Virtual Private Network programs or, if she was looking for some heavy-duty protection, she could have downloaded the Tor Project’s anonymizing browser. We should all takes notes from her misfortune. For those of us who have been able to look beyond the shirtless-pic-sending FBI agents and Tampa socialite “honorary consuls” and overly flirtatious four-star generals, the obvious lesson to take away from this mess is that if we’re going to play hanky-panky with the director of the CIA, we’d better make sure we’re using the best privacy protection tools available.
But there’s another, more important lesson to be gleaned from this tale of a biographer run amok. Broadwell’s debacle confirms something that some privacy experts have been warning about for years: Government surveillance of ordinary citizens is now cheaper and easier than ever before. Without needing to go before a judge, the government can gather vast amounts of information about us with minimal expenditure of manpower. We used to be able to count on a certain amount of privacy protection simply because invading our privacy was hard work. That is no longer the case. Our always-on, Internet-connected, cellphone-enabled lives are an open door to Big Brother. Just ask Paula Broadwell.
* * * *
The title of Chris Soghoian’s dissertation is “The Spies We Trust: Third Party Service Providers and Law Enforcement Surveillance.” The changing economics of surveillance is a topic close to his heart. As recently as a decade ago, he says, surveillance’s “high transaction costs protected people’s privacy without the need for the law to do it.”
But then came the Internet, and GPS-enabled cellphones, and social networks. The cost of both crunching and storing data plummeted. We’ve seen this story play out in a host of domains — the Internet is really, really great at removing the “frictions” that would otherwise raise the cost of providing goods and services. Facebook’s Mark Zuckerberg loves to talk about how his social network facilitates “frictionless sharing.” But there’s a dark side to all the consumer benefits we gain from the digital, networked era. Call it “frictionless surveillance.”
When the last major law on electronic communications and privacy was passed in 1986, notes Soghoian, cellphones barely existed and most companies considered it far too expensive to store years of data about their customers, if they even collected it at all. Today, says Soghoian, the phone companies store years of location data, and law enforcement agents can gain access to it through custom-made Web-based interfaces. Companies like Facebook and Google have hundreds of employees whose sole job is to deal with government information requests. Remember those episodes of “The Wire” in which key plot points hinged upon whether investigators could get the funding and authorization necessary for expensive surveillance operations? Today’s intelligence agents “never have to leave their room,” says Soghoian.
Nor do they, in many cases, need to go before a judge. In the case of Paula Broadwell, as Julian Sanchez devastatingly documented for Reuters, the FBI was able to obtain subpoenas for Internet Protocol logs, guest records from hotels, and Wi-Fi activity at those hotels without seeking judicial approval or a warrant.
“We have unwittingly constructed a legal and technological architecture that brings point-and-click simplicity to the politics of personal destruction,” writes Sanchez. “The Petraeus affair has, for a moment, exposed that invisible scaffolding – and provided a rare opportunity to revisit outdated laws and reconsider the expanded surveillance powers doled out over the past panicked decade.”
“I think it is problematic and a concern for me that the government can pierce the veil of anonymity that Broadwell and General Petraeus worked so hard to erect,” says Soghoian, “and they can determine the identity of these people who have taken affirmative steps to protect their privacy, without having to appear before a judge. The history books are filled with examples of governments abusing surveillance powers — it’s just too easy not to — and one of the ways that we protect our society against that is by placing a judge in the middle.”
Our laws haven’t kept up with the changes wrought by technological progress, says Soghoian. He cites the work of law professor Harry Surden, who presciently saw all this coming in a law review article published in 2007. Surden explained that many of the safeguards that have traditionally protected our privacy never had to be written down in the legal code, because they weren’t needed: It was too hard or too expensive to gather all that detailed, granular information about our lives.
Surden warned that technological change would eventually result in the withering away of these “structural constraints” protecting our privacy. In the introduction to his law review essay, Surden wrote, “I emphasize the way in which latent structural constraints –which are premised upon cost inhibiting actions — are vulnerable to erosion by particular emerging technologies that lower those inhibiting costs. To the extent that society depends upon the presence of these costs to reliably inhibit a potential privacy-violating activity, their dissipation results in a sudden regulatory shift, leaving these interests unprotected.”
In that context, Broadwell’s misadventures are a wake-up call. Our interests are no longer being protected, and most of us haven’t even noticed, distracted by the last viral video posted on Facebook. We may not feel impelled to strike up an affair with one of the most powerful men in America, or send harassing emails to potential rivals, but we do have the right to draw the line at what our own government can find out about us without either our permission or that of a judge. If the old constraints are gone, it’s high time for some new ones.
More Related Stories
- Teenagers care more about online privacy than you think
- The Maker kids are alright
- Radio host tweets rape joke, blames journalists for reporting on it
- Cyber attacks could cause the next world war
- Snapchat is secretly storing your photos
- Apple's biggest sin: Popularity
- Facebook's hate speech problem
- Amazon set to launch fine-art gallery
- Twitter torches Dan Brown's "Inferno"
- Looting in Oklahoma?
- Wikipedia cleans up its mess
- You are less beautiful than you think
- Should wunderkinds be allowed to drop out of high school?
- Don't cry climate-change wolf
- Apple uses foreign companies to avoid billions in taxes
- Gitmo hunger striker launches Twitter campaign
- How to screw up Tumblr
- Yahoo shells out $1.1 billion for Tumblr
- Chinese hackers resume attacks against U.S.
- Must-see morning clip: Facial recognition software identifies "faceprints"
- Facebook "like" on trial in Virginia
Featured Slide Shows
The week in 10 picsclose X
- 1 of 11
Lisa Montgomery embraces her nephew Thursday after a tornado tore apart her home in Cleburne, Texas. The twister killed six people and destroyed entire swaths of the North Texas town.
Credit: AP/LM Otero
Jack McMahon, the defense attorney for abortion doctor Kermit Gosnell, speaks outside the Criminal Justice Center in Philadelphia Tuesday. His client was convicted of killing three babies in his clinic, and will serve multiple life sentences.
Credit: AP/Matt Rourke
A photo taken Monday captures Vice President Joe Biden's response to a Milwaukee second-grader's innovative proposal to end America's epidemic of gun violence. This guy!
Credit: AP/Jenny Aicher
Sen. Rand Paul, R-Ky., flanked by a grouper-eyed Michele Bachmann, addresses the IRS' admission that it targeted Tea Party groups in advance of the 2012 election. In an op-ed for CNN Thursday, the Kentucky senator slammed the president for his faux outrage.
Credit: AP/Molly Riley
Ousted IRS chief Steven Miller is sworn in on Capitol Hill Friday. Miller testified before the House Ways and Means Committee on the extra scrutiny the agency gave conservative groups applying for tax-exempt status.
Credit: AP/J. Scott Applewhite
Attorney General Eric Holder pauses as he testifies on Capitol Hill before the House Judiciary Committee Wednesday. Holder is under fire, among other things, for the Justice Department's gathering of phone records at the Associated Press.
Credit: AP/Carolyn Kaster
O.J. Simpson sits during an evidentiary hearing at Clark County District Court in Las Vegas, Nev., Thursday. Simpson, who is currently serving a nine-to-33-year sentence in state prison for armed robbery and kidnapping, is using a writ of habeas corpus to seek a new trial.
Credit: AP/Las Vegas Review-Journal/Jeff Scheid
Major Tom to ground control: On Sunday astronaut Chris Hadfield recorded the first music video from space, a cover of David Bowie's "Space Oddity."
Credit: AP/NASA/Chris Hadfield
When it rains it pours. President Barack Obama speaks during a news conference Thursday with Turkish Prime Minister Recep Tayyip Erdogan, inexplicably inspiring an #umbrellagate Twitter meme.
Credit: AP/Jacquelyn Martin
A smoke plume rises high above a road block at the intersection of County A and Ross Road east of Solon Springs, Wis., Tuesday. No injuries were reported, but the the wildfire caused evacuations across northwestern Wisconsin.
Credit: AP/The Duluth News-Tribune/Clint Austin
Recent Slide Shows
- 1 of 11