Golden Shield – the brave new world of surveillance

The Rolling Stone has a good article (though a bit heavy on the breathless hype at times) about Golden Shield, China’s country-wide surveillance system that is in continuous development. It’s an ambitious project to pull together all sorts of data from HD-CCTV to mobile phone triangulation to Internet monitoring.

But the cameras that Zhang manufactures are only part of the massive experiment in population control that is under way here. “The big picture,” Zhang tells me in his office at the factory, “is integration.” That means linking cameras with other forms of surveillance: the Internet, phones, facial-recognition software and GPS monitoring.

One test that is about to happen (or probably already has happened) is the “10-million faces” test:

Yao is managing director of Pixel Solutions, a Chinese company that specializes in producing the new high-tech national ID cards, as well as selling facial-recognition software to businesses and government agencies. The test, the first phase of which is only weeks away, is being staged by the Ministry of Public Security in Beijing. The idea is to measure the effectiveness of face-recognition software in identifying police suspects. Participants will be given a series of photos, taken in a variety of situations. Their task will be to match the images to other photos of the same people in the government’s massive database. Several biometrics companies, including Yao’s, have been invited to compete. “We have to be able to match a face in a 10 million database in one second,” Yao tells me. “We are preparing for that now.

They can already match a face to multiple pictures of the same person in their internal database of 600,000 records in just over a millisecond.

The point of the test though is not just how bad surveillance is in China, it’s the fact that Western companies are clamouring to be involved, even using loopholes in legislation to avoid prohibitions on selling software for law enforcement use. Worse still is that post-9/11 Western obsession with surveillance has given China a golden opportunity to legitimise their own strategies:

Such efforts have provided China’s rulers with something even more valuable than surveillance technology from Western democracies: the ability to claim that they are just like us. Liu Zhengrong, a senior official dealing with China’s Internet policy, has defended Golden Shield and other repressive measures by invoking the Patriot Act and the FBI’s massive e-mail-mining operations. “It is clear that any country’s legal authorities closely monitor the spread of illegal information,” he said. “We have noted that the U.S. is doing a good job on this front.” Lin Jiang Huai, the head of China Information Security Technology, credits America for giving him the idea to sell biometric IDs and other surveillance tools to the Chinese police. “Bush helped me get my vision,” he has said. Similarly, when challenged on the fact that dome cameras are appearing three to a block in Shenzhen and Guangzhou, Chinese companies respond that their model is not the East German Stasi but modern-day London.

Sounds like a world that Eric Blair would recognise..

Norways OOXML “yes” vote was down to ONE person

It appears through a process of elimination of the nearly 30 attendees at the Standard Norway meeting on OOXML the decision to vote yes was made unilaterally by the vice-president of Standard Norway.

When the original attendees could not reach consensus on 8 of the 12 comments (having agreed that 2 were not satisfactorily resolved and 2 were) he dismissed 23 attendees. When the remaining 7 could not agree he dismissed another 4 and when the remaining 2 could not agree…

The VP thereupon declared that there was still no consensus, so the decision would be taken by him.

He voted “yes”.

So this one bureaucrat, a man who by his own admission had no understanding of the technical issues, had chosen to ignore the advice of his Chairman, of 80% of his technical experts, and of 100% of the K185 old-timers.

Ross Anderson’s “Security Engineering”

Back in 2006 Ross Anderson (Professor of Security Engineering at the Cambridge Computer Laboratory) announced on his blog that he had published the full contents of the first edition of his book “Security Engineering” in PDF format. The book covers a whole range of security issues from creating, managing, accrediting & breaking the mechanisms themselves through security politics and into topics like DRM.

Now the second edition of Security Engineering is about to arrive (published April 14th in the US, Amazon say stock expected in 1-4 weeks) and mine is on order already (along with a copy of Linus Torvalds Just for Fun).. 🙂

Quote for the day

In 1969 Bob Wilson (later the first director of Fermilab) was called before a hearing of the US Congressional Joint Committee on Atomic Energy to answer questions about particle accelerators. In it Senator John Pastore demanded to know how such a device improved the security of America and Bob Wilsons response of “nothing at all” didn’t go down to well, and so he was prodded further.

His obituary from Cornell in January 2000 puts it like this:

“It has only to do,” Wilson told the lawmakers, “with the respect with which we regard one another, the dignity of men, our love of culture. It has to do with: Are we good painters, good sculptors, great poets? I mean all the things we really venerate in our country and are patriotic about. It has nothing to do directly with defending our country except to make it worth defending.”

I have to concur.

New Jersey Voting Bugs

Steve Bellovin reports:

Ed Felten has posted two articles describing bugs in New Jersey’s electronic voting systems. Briefly, the total votes for all of the candidates add up to more than the number of votes the machines believe were cast.

The voting machine company, Sequoia, has proffered an explanation of the bug, but Ed Felten points out in his second article that one of the tapes now analysed shows this to be inadequate as the total number of votes is more than the “public counter” which is the voting machines own total of the count. He writes:

Each machine has a “public counter” that keeps track of how many votes were cast on the machine in the current election. The public counter, which is found on virtually all voting machines, is one of the important safeguards ensuring that votes are not cast improperly. […]

The public counter is important enough that the poll workers actually sign a statement at the bottom of the tape, attesting to the value of the public counter.

Unfortunately..

The public counter says 105, even though 106 votes were reported. That’s a big problem.

Oops..

Brendan Nelson apologises over his “sorry” speech

From the ABC news:

Federal Opposition leader Brendan Nelson has issued another very specific apology to a member of the Stolen Generations. In his speech in reply to the national apology this week, Dr Nelson referred to the story of a Victorian Aboriginal elder, Faye Lyman. But Ms Lyman says Dr Nelson did not ask her if he could use her story. When he incorporated it in what she describes as a “toxic speech”, she says he took her comments out of context, misrepresented the way she was taken from her family, and made her feel “stolen all over again”.

She goes on to say:

My Dad was not happy that I was taken […] They cheated us, they cheated me of my life with him. Now, I feel like I’m stolen all over again. My dignity, and I’m ashamed he’s done this to me, I’m so ashamed.

No wonder that hundreds of people turned their back on him as he spoke in response to the sorry motion in Parliament (see picture 7 in the ABC News slideshow).

IFPI – can we control all European Internet traffic – please ?

From Ars Technica (early December):

Imagine a world in which a single industry could control an entire continent’s access to particular web sites, force ISPs to install expensive deep packet inspection gear that would search the complete Internet data streams of millions of users, and force Internet applications to conform to its design parameters or risk being blocked. If you’re a European consumer, this might sound like a paranoid dystopia, but it’s actually a vision of paradise—if paradise were designed by the IFPI.

What are they after ? Terrorists ? Paedophiles ? Drug runners ? Not quite..

In a recent memo to European legislators, the worldwide music lobby laid out its vision of a world in which all ISPs adopted three “feasible and reasonable options” to help address copyright infringement on their networks.

Not surprisingly the EFF has something to say about this (PDF)..