Skip to main content
Part of complete coverage from

NSA's phone snooping a different kind of creepy

By Douglas Rushkoff, Special to CNN
June 6, 2013 -- Updated 1834 GMT (0234 HKT)
STORY HIGHLIGHTS
  • Douglas Rushkoff: NSA collecting call records from Verizon should not be surprising
  • He says we hand out vast amounts of personal info about ourselves via smartphones
  • He says NSA wants call info for database to help track terrorists, and we are control group
  • Rushkoff: This activity cuts both ways: Digital trail led to revelation leaked to press

Editor's note: Douglas Rushkoff writes a regular column for CNN.com. He is a media theorist and the author of the new book "Present Shock: When Everything Happens Now."

(CNN) -- I'm finding it hard to get too worked up over the revelation that the National Security Agency has been authorized by the secret Foreign Intelligence Surveillance Court to collect all our call data from Verizon. Hasn't everyone already assumed this? Everything we do in the digital realm -- from surfing the Web to sending an e-mail to conducting a credit card transaction to, yes, making a phone call -- creates a data trail. And if that trail exists, chances are someone is using it -- or will be soon enough.

This particular style of privacy invasion looks a bit different from those old TV movies where FBI agents sit in a van listening in on phone calls and recording them on reel-to-reel tape recorders. The government isn't interested in the content of our phone calls -- our conversations -- so much as who is calling whom and when, or what has become known as metadata. Your life and pursuits are less important than the statistical profile of the way you use your digital devices. This is the world of big data.

Douglas Rushkoff
Douglas Rushkoff

I remember the days when talking about such possibilities was considered conspiracy theory or paranoia. Many of us imagined a future in which people would be planted with chips that monitor our conversations and whereabouts. Perhaps we'd even accept such tagging voluntarily, if it meant being able to track down our children in the unlikely event of a kidnapping.

What does the Verizon order mean for me?

But such extraordinary measures proved unnecessary; we're all walking around with tracking devices in our pockets, which are capable not simply of broadcasting our phone calls, but our physical locations, our movements, our interests -- and then tying all this data to our consumer profiles, credit histories ... everything.

Yes, it's still creepy, but it's a different kind creepy than it appears. Big data analysis works by identifying patterns and anomalies in our behavior. Nobody cares about the reasons why certain people do certain things. They only need to be able to predict the future. Marketers use big data profiling to predict who is about to get pregnant, who is likely to buy a new car, and who is about to change sexual orientations. That's how they know what ads to send to whom. The NSA, meanwhile, wants to know who is likely to commit an act of terrorism -- and for this, they need us.

The only way for them to identify the kinds of statistical anomalies that point to a terror candidate is to have a giant database of all those behavior patterns that don't suggest imminent violence. What is different about the Tsarnaev brothers' patterns of telephone usage from that of every other young male Chechen immigrants? You need both sets of data to figure that out. We are not the targets so much as the control group.

Opinion: The great privacy debate

Everything you do in the digital realm may as well be broadcast on prime-time television and chiseled on the side of the Parthenon.
Douglas Rushkoff

Of course, that's small comfort to a people who have long valued and assumed some measure of privacy from government observation. The American assumption of privacy allows those of us who do break certain laws -- say, smoking pot or engaging in prostitution -- from the fear of selective enforcement if we happen to be personal or political enemies of those in charge. As recent Internal Revenue Service scandals prove, our most trusted agencies are not above targeted investigations of ideological foes.

The harder truth to accept is that we are moving into a digital reality where the assumption of privacy must be exchanged for an assumption of observation. Our telephone metadata is just the tip of the iceberg. Sure, President Barack Obama was quick to respond to the surprise discovery of his administration's covert surveillance operation, promising Americans that the leaked document describes the full extent of this technological intrusion on our privacy. But this court order was already "top secret." Had it not been uncovered, its provisions would have been denied as well.

My own friends in the digital telephony and networking industries have long told me about "splitters" at all major communications companies, through which every data signal can be observed and diverted. Other technicians have told me about giant server farms in Virginia and Utah, where all of our digital data -- including encrypted e-mails and phone calls -- are being stored. No, they don't have the technological ability or legal authority to search this tremendous repository of data (if it really exists). But they may at some point in the future.

Crowley on national security

Besides, the lack of court orders authorizing a particular style of surveillance don't stop any of this surveillance from happening. It simply makes any information collected inadmissible in a court of law. Since the dawn of the Internet, I have always operated under the assumption that if the government or corporations have technological capability to do something, they are doing it -- whatever the laws we happen to know about might say.

Digital media are biased toward replication and storage. Our digital photos practically upload and post themselves on Facebook, and our most deleted e-mails tend to resurface when we least expect it. Yes, everything you do in the digital realm may as well be broadcast on prime-time television and chiseled on the side of the Parthenon.

Does this excuse our government's behavior? Of course not. But the silver lining here is that this digital transparency cuts both ways. No sooner does the government win a court order to spy on us than the digital trail of that court order is discovered and leaked to the press. The government's panicky surveillance of Associated Press reporters and disproportionate prosecution of WikiLeaks participants lay bare its own inability to contend with the transparency of digital communications.

It is disheartening and disillusioning to realize that our government knows every digital thing we say or do. But now, at least we know they know.

Follow us on Twitter @CNNOpinion.

Join us on Facebook/CNNOpinion.

The opinions expressed in this commentary are solely those of Douglas Rushkoff.

ADVERTISEMENT
Part of complete coverage on
July 12, 2014 -- Updated 1815 GMT (0215 HKT)
To prevent war with North Korea over a comedy, what would Dennis Rodman say to Kim Jong Un? Movie critic Gene Seymour weighs in.
July 11, 2014 -- Updated 1315 GMT (2115 HKT)
Michael Werz says in light of the spying cases, U.S. is seen as a paranoid society that can't tell friends from foes.
July 11, 2014 -- Updated 1317 GMT (2117 HKT)
Eric Liu explains why in his new book, he calls himself "Chinese American" -- without a hyphen.
July 11, 2014 -- Updated 1512 GMT (2312 HKT)
John Bare says hands-on learning can make a difference in motivating students to acquire STEM skills.
July 11, 2014 -- Updated 1320 GMT (2120 HKT)
Karl Alexander and Linda Olson find blacks and whites live in urban poverty with similar backgrounds, but white privilege wins out as they grow older.
July 10, 2014 -- Updated 1620 GMT (0020 HKT)
Frida Ghitis says a poll of 14 Muslim-majority nations show people are increasingly opposed to extremism.
July 10, 2014 -- Updated 1828 GMT (0228 HKT)
Ruben Navarrette says spending more on immigation enforcement isn't going to stop the flow of people seeking refuge in the U.S.
July 10, 2014 -- Updated 2048 GMT (0448 HKT)
Faisal Gill had top security clearance and worked for the Department of Homeland Security. That's why it was a complete shock to learn the NSA had him under surveillance.
July 10, 2014 -- Updated 1841 GMT (0241 HKT)
Kevin Sabet says the scientific verdict is that marijuana can be dangerous, and Colorado should be a warning to states contemplating legalizing pot.
July 9, 2014 -- Updated 2047 GMT (0447 HKT)
World War I ushered in an era of chemical weapons use that inflicted agonizing injury and death. Its lethal legacy lingers into conflicts today, Paul Schulte says
July 10, 2014 -- Updated 1137 GMT (1937 HKT)
Tom Foley and Ben Zimmer say Detroit's recent bankruptcy draws attention to a festering problem in America -- cities big and small are failing to keep up with change.
July 10, 2014 -- Updated 1201 GMT (2001 HKT)
Mel Robbins says many people think there's "something suspicious" about Leanna Harris. But there are other interpretations of her behavior
July 9, 2014 -- Updated 1753 GMT (0153 HKT)
Amy Bass says Germany's rout of Brazil on its home turf was brutal, but in defeat the Brazilian fans' respect for the victors showed why soccer is called 'the beautiful game'
July 9, 2014 -- Updated 2107 GMT (0507 HKT)
Aaron Carroll explains how vaccines can prevent illnesses like measles, which are on the rise
July 9, 2014 -- Updated 0008 GMT (0808 HKT)
Aaron Miller says if you think the ongoing escalation between Israel and Hamas over Gaza will force a moment of truth, better think again
July 8, 2014 -- Updated 1903 GMT (0303 HKT)
Norman Matloff says a secret wage theft pact between Google, Apple and others highlights ethics problems in Silicon Valley.
July 8, 2014 -- Updated 2237 GMT (0637 HKT)
The mother of murdered Palestinian teenager Mohammed Abu Khder cries as she meets Palestinian president Mahmoud Abbas in Ramallah, West Bank on July 7, 2014.
Naseem Tuffaha says the killing of Israeli teenagers has rightly brought the world's condemnation, but Palestinian victims like his cousin's slain son have been largely reduced to faceless, nameless statistics.
ADVERTISEMENT