¿Por qué me vigilan, si no soy nadie? | Marta Peirano | TEDxMadrid

TEDx Talks
22 Sept 201509:33

Summary

TLDRThis script discusses the pervasive nature of data collection in modern society, highlighting the case of Malte Spitz, who obtained extensive records of his personal data from Deutsche Telekom. It illustrates how mobile phones and technology create a digital footprint that can be monitored and manipulated, emphasizing the importance of privacy and the use of encryption to protect against unforeseen vulnerabilities in an increasingly surveilled world.

Takeaways

  • 🔒 We often underestimate the amount of personal data we generate daily and the potential risks associated with it.
  • 💡 The value of our personal information is often underappreciated, despite its potential for misuse.
  • 🌐 The misconception that only powerful agencies like the NSA pose a threat to our privacy is debunked; we are our own biggest threat by living 'in glass houses'.
  • 📝 Malte Spitz's experience with Deutsche Telekom highlights the extent of data retention, where he received a CD with over 30,000 lines of data about his communications.
  • 📈 The EU's Data Retention Directive mandates that telecom companies store user data for a minimum of six months to a maximum of two years, showing the legal framework for data collection.
  • 🗺️ Data visualization can turn raw data into a detailed 'diary' of a person's life, revealing intimate details about their daily activities and movements.
  • 📱 Mobile phones constantly 'ping' the nearest antenna every five minutes, creating a digital trail of our whereabouts and activities.
  • 👥 The collective data from individuals can be used to monitor and manipulate crowds, as demonstrated by the Ukrainian government's actions during a protest.
  • 👀 Surveillance is not only through mobiles but also through computers, cameras, and other tracking devices, creating a comprehensive profile of individuals.
  • 🛒 Companies like Wal-Mart collect personal data through reward cards, providing insights into consumers' habits and preferences.
  • 🛡️ The use of cryptography and privacy tools like Tor is encouraged to protect ourselves from the unintended consequences of pervasive surveillance.

Q & A

  • What are the three mistakes people make regarding their information according to the speaker?

    -The three mistakes are underestimating the quantity of information we produce daily, depreciating the value of that information, and thinking that our main problem is a distant and super powerful agency like the NSA.

  • Who is Malte Spitz and what did he request from his telephone company?

    -Malte Spitz is a member of the German Green Party. In 2009, he requested his telephone company, Deutsche Telekom, to send him all the data they had on him.

  • What was the outcome of Malte Spitz's request for his data from Deutsche Telekom?

    -After two lawsuits, Deutsche Telekom sent Malte Spitz a CD with an Excel table containing 30,832 lines of data, covering a period from September 2009 to February 2010.

  • What is the significance of the six-month data period provided to Malte Spitz?

    -The six-month period is significant because it aligns with the European Union's Data Retention Directive, which mandates that telephone companies with more than 10,000 clients keep the data of all their clients for a minimum of six months and a maximum of two years.

  • How was the vast amount of data Malte Spitz received processed and visualized?

    -Malte Spitz sent the data to a weekly magazine, which then contacted a data visualization agency to create a comprehensive map of his life, incorporating public information such as his Twitter and blog posts.

  • What kind of insights can be derived from the data visualization of Malte Spitz's life?

    -The data visualization provides insights into Malte's daily activities, such as when he catches a train, where he stays, when he eats, sleeps, takes a flight, who calls him, and the duration of calls, as well as messages received.

  • How often does a mobile phone communicate with the nearest antenna, and what information does it exchange?

    -A mobile phone communicates with the nearest antenna every five minutes, sending a 'ping' to check for emails, WhatsApp messages, or any updates from the world.

  • What is the potential impact of the data collected by mobile phones on privacy and surveillance?

    -The data collected by mobile phones can be used for surveillance, revealing personal habits, locations, and interactions, making individuals vulnerable to privacy invasion and potentially affecting their freedom and safety.

  • How can the data from mobile phones be used to monitor and control crowds during public gatherings?

    -Data from mobile phones can be used to identify who is present at a public gathering, track their movements, and even isolate influential individuals by disrupting their mobile network connectivity.

  • What is the historical precedent mentioned in the script that highlights the dangers of data collection?

    -The script refers to the Dutch census that included information about religious affiliations, which was later used by the Nazis during World War II, resulting in a low survival rate among Dutch Jews.

  • What is the speaker's recommendation for individuals to protect their privacy in the digital age?

    -The speaker recommends using cryptography in mobiles, communications, and computers, and advises caution when accepting reward cards or services that require personal data. Additionally, the speaker suggests using tools like Tor for internet browsing to enhance privacy.

Outlines

00:00

🔍 The Unseen Surveillance: Malte Spitz's Data Revelation

Malte Spitz, a German Green Party member, requested his phone company to share data they held on him. After legal battles, he received a CD with 30,832 lines of data, revealing his movements and activities over six months. This data was a result of the EU's Data Retention Directive, which mandates companies to store client data for up to two years. The magazine that received the data collaborated with a data visualization agency to create an extensive map of Spitz's life, showing his daily activities, travel patterns, and communications. The script discusses how mobile phones constantly 'ping' their location to the nearest antenna, creating a detailed diary of our lives that can be accessed and analyzed by anyone with the right tools, emphasizing the pervasive nature of surveillance in our digital age.

05:01

🏠 Privacy in the Digital Age: The Vulnerability of Our Data

The script delves into the broader implications of data surveillance beyond mobile phones, including computers, street cameras, and identification chips in wallets. It highlights how personal data is collected and stored, making us vulnerable to misuse by various entities, from governments to companies. The speaker argues that the mere existence of this data poses a risk, as it can be used against us in unforeseen ways. Historical examples, such as the Dutch census during World War II, are used to illustrate the potential dangers of such data. The speaker concludes by advocating for the use of cryptography and privacy tools like Tor to protect ourselves from unwanted surveillance, emphasizing the importance of these measures for the health of democracy.

Mindmap

Keywords

💡NSA

The National Security Agency (NSA) is a U.S. government agency responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes. In the video, the NSA is mentioned as a powerful entity capable of surveillance, but the speaker argues that the real issue is not the agency itself but the data we generate and its potential misuse, as the NSA doesn't need its resources to spy on us when we expose our data so readily.

💡Data Retention Directive

The Data Retention Directive is a European Union regulation that mandates telecommunications companies to store certain types of data for a specified period, ranging from six months to two years. In the context of the video, it is highlighted as the reason why Malte Spitz received a CD with six months of his data, illustrating the extent of data retention and the implications for privacy.

💡Malte Spitz

Malte Spitz is a German politician who, in 2009, requested his telecommunications company to send him all the data they had collected about him. The video uses his case to illustrate the vast amount of personal data that can be collected and the detailed insights it provides into an individual's life, emphasizing the privacy concerns associated with data collection.

💡Data Visualization

Data visualization is the graphical representation of information and data. In the video, a data visualization agency was contacted to make sense of the extensive data Deutsche Telekom provided to Malte Spitz. The result was a detailed map of his life, showing movements, communications, and activities, which underscores the invasive potential of data when properly analyzed.

💡Surveillance

Surveillance refers to the close observation of individuals, often for the purpose of maintaining security or control. The video discusses how everyday activities and communications are monitored through various means, such as mobile phones, cameras, and data collection, raising questions about the balance between security and privacy.

💡Cryptography

Cryptography is the practice of secure communication techniques that allow only the intended recipient to read the contents of a message. The speaker in the video advocates for the use of cryptography in mobiles and communications to protect personal data from unauthorized access and surveillance.

💡Tor

Tor is a network that enables anonymous communication by directing internet traffic through a worldwide volunteer overlay network. The video suggests using Tor as a means to protect one's online activities from being monitored, emphasizing the importance of privacy tools in the digital age.

💡Algorithm

An algorithm is a set of rules or procedures for solving problems or performing calculations. In the context of the video, algorithms are used to analyze and interpret the vast amounts of data collected, such as mobile phone data, to identify patterns and behaviors, which can be used for surveillance or marketing purposes.

💡Personal Identification

Personal identification refers to the process of verifying an individual's identity, often through documents or digital means. The video mentions various forms of personal identification, such as ID cards and reward cards, which can inadvertently collect and reveal personal information, contributing to the overall surveillance state.

💡Data Protection Law

Data protection laws are legal frameworks designed to protect the privacy and security of individuals' data. The video mentions that companies like Deutsche Telekom and Telefónica must comply with these laws, yet there are still concerns about how data is collected, stored, and potentially misused.

💡Vulnerability

Vulnerability, in the context of the video, refers to the potential for harm or exploitation due to the exposure of personal information. The speaker argues that the existence of personal data makes individuals vulnerable to unforeseen risks, emphasizing the need for proactive measures to protect privacy.

Highlights

We make three mistakes: underestimating the quantity of information we produce daily, depreciating its value, and thinking the NSA is our main privacy concern.

Malte Spitz, a German Green Party member, requested all his data from Deutsche Telekom, receiving a CD with 30,832 lines of data.

The EU's Data Retention Directive mandates telecom companies to store customer data for 6 months to 2 years, impacting privacy.

Deutsche Telekom's data and Malte's public information were used to create a detailed, 'creepy' map of his life, showing movements, communications, and habits.

Mobile phones 'ping' antennas every 5 minutes, revealing our location and activities, contributing to a comprehensive surveillance profile.

Surveillance is not limited to mobiles; it extends to computers, cameras, radars, and personal identification chips in wallets.

Wal-Mart, not a surveillance agency, once held the world's largest personal database due to its reward cards collecting extensive customer data.

Online companies that offer 'free' services often sell user data for profit, questioning the real cost of 'free'.

Algorithms create surveillance profiles regardless of a person's importance, making everyone equally vulnerable to potential misuse of their data.

Surveillance can lead to severe consequences, such as being stuck at an airport in a country where homosexuality is illegal.

Historical examples, like the Dutch census used by Nazis, show the danger of data falling into the wrong hands.

The mere existence of personal data makes us vulnerable in unforeseeable ways, emphasizing the need for privacy measures.

Cryptography should be used in mobiles and communications to protect our data and enhance privacy.

Surveillance is a disease harming democracy; using tools like Tor can help maintain privacy and require a warrant for monitoring.

The speaker urges the audience to be proactive about privacy, using encryption and being cautious with data sharing.

The applause at the end signifies the audience's appreciation and agreement with the importance of privacy and resistance to surveillance.

Transcripts

play00:00

Translator: VICTOR AWOYEMI Reviewer: Alina Siluyanova

play00:14

We make three mistakes:

play00:16

the first is underestimating the quantity of information that we produce every day;

play00:21

the second is depreciating the value of that information;

play00:25

and the third is thinking that our principal problem

play00:29

is a distant and super powerful agency that is called NSA.

play00:33

And it is true that NSA has the major access, better resources,

play00:38

the best tools, but they don't need any of that

play00:41

to spy on us,

play00:42

because we have everything there; we live in glass houses.

play00:48

This is Malte Spitz, a member of the German Green Party.

play00:51

In 2009, Malte asked his telephone company

play00:55

to send him all the data they had on him.

play00:58

And the Deutsche Telekom, which was his company, told him no.

play01:01

Two lawsuits later, they sent him a CD

play01:04

with an Excel table of 30,832 lines;

play01:08

like "The War and the Peace", but three times larger.

play01:11

This endless document contains information

play01:13

from September of 2009 to February of 2010;

play01:16

it has exactly six months.

play01:18

This isn't accidental, it has six months because in the summer of 2008

play01:21

the European Union presented the Data Retention Directive,

play01:25

where they demanded each telephone company

play01:27

with more than 10,000 clients

play01:28

keep the data of all their clients

play01:30

for a minimum of six months and a maximum of two years.

play01:33

They gave Malte data of 6 months, as if saying,

play01:36

"This is everything we have because the law forces us."

play01:38

They probably owe him a year and half.

play01:40

Malte, who couldn't process this amount of information,

play01:43

sent it to a weekly magazine

play01:45

which, in turn, contacted a data visualization agency

play01:47

to do something with it.

play01:49

They took the data from Deutsche Telekom

play01:52

and Malte's public information,

play01:54

like, for example, information from his Twitter account or his blog.

play01:58

And with this they created the map that you are looking at now,

play02:01

that is more than a map, it is more like a creepy automatic diary

play02:07

of Malte's life.

play02:08

We can see when he catches a train, which he's doing right now,

play02:11

when he stops, where he stays,

play02:13

when he goes, how he goes,

play02:15

how much time it takes him, when he is eating,

play02:17

when he is sleeping, like right now;

play02:19

when he takes a flight, who calls him, how long they speak,

play02:22

who sends him messages, what are the messages.

play02:24

We see everything.

play02:28

This is on the Internet. You can see it.

play02:31

The reason why this happens

play02:33

is because Malte has a mobile in his pocket

play02:36

that every five minutes makes a "ping" to the closest antenna and tells it,

play02:40

"Do you have something for me? Do I have mail?

play02:42

Do I have any WhatsApp messages?

play02:45

Has something happened in the world?"

play02:48

Raise your hand if you have a mobile in your pocket that does the same.

play02:53

Every five minutes our mobiles are saying,

play02:57

"I'm here, I'm here, now I'm here,

play02:59

hey, I'm here..."

play03:00

That's what happens.

play03:01

And this doesn't have precedents. We didn't have this before.

play03:05

The direct equivalent of that is what we have now on the screen.

play03:09

This is the profile of a person watched by the Stasi for years.

play03:14

Looks like a napkin, doesn't it? With 46 posts including

play03:18

his aunt, the milkman, the priest of his church --

play03:22

These are five minutes in the life of Malte Spitz,

play03:26

and this information is automatic.

play03:28

And the worst thing is that this is only the data on Malte,

play03:31

but Malte is surrounded by people like us with mobiles like his

play03:34

that are producing the same information;

play03:37

and that company sees everything.

play03:40

This is a photo made by my colleague Juanlu Sánchez,

play03:43

a photo from manifestation 15-M.

play03:45

But let's look at it from a telecommunications' viewpoint.

play03:48

This square is full with mobiles.

play03:51

Using those mobiles we can know exactly who is at the square,

play03:54

almost as if we put a cordon around;

play03:56

with names and surnames.

play03:58

And not only we know when they have come, where they come from and with whom,

play04:02

whom they leave with, whom they call to;

play04:04

we know everything about them.

play04:06

We even know if they are on the 4th floor or down at the square.

play04:11

This is how that photo is seen by an algorithm of traffic analysis.

play04:17

And here we begin to see some cool stuff.

play04:20

We see that not all the people at the square are the same.

play04:25

There are people more important than others,

play04:28

and if we have control over these telecommunications,

play04:31

this network, we can do things,

play04:32

like turning off the nodes on this square,

play04:35

in other words, isolate those who gather others around them from the rest.

play04:41

Also we can do what the Ukrainian government did about a year and half ago:

play04:45

send out a message saying,

play04:48

"Dear user, you've been registered

play04:52

as a participant in a massive illegal manifestation."

play04:57

We don't behave the same when we know that we are watched.

play05:00

Since Jeremy Bentham we know

play05:02

that the best way to watch a population

play05:04

is for them not to know when they are watched and when not.

play05:07

In Malte's case, during those 6 months,

play05:09

they were watching him for 78 percent of the time.

play05:13

And we're only talking about our mobiles.

play05:17

We are not talking about our computers,

play05:19

nor the cameras that are on the streets,

play05:21

in the stores and shop-windows,

play05:23

in the airports and trains,

play05:24

and wherever we are, being watched.

play05:27

We are not talking about the radars on the roads

play05:30

that register us if we overspeed.

play05:32

We are not talking about what we have in a wallet.

play05:35

How many personal identification chips do we have in a wallet?

play05:39

We have a lot: an ID card,

play05:41

a driving license or a transport ticket,

play05:43

credit or debit cards, reward cards.

play05:46

A supermarket reward card.

play05:49

20 years ago, the biggest personal data base in the world

play05:52

was not owned by NSA, neither by the Stasi, poor thing.

play05:57

It was owned by Wal-Mart, the American supermarket chain.

play06:00

Why? Because when they give you a reward card,

play06:02

what you're doing is telling a company who you are, where you live,

play06:06

how much you earn, what you buy,

play06:08

what you eat, how many kids you have,

play06:09

when you go on vacations, when you get sick.

play06:12

And all this we give them hoping that in six months or in a year,

play06:15

if we spend a lot of money, they'll give us a Tupperware.

play06:18

(Laughter)

play06:20

And it's not different from what we do on the Internet,

play06:23

because Deutsche Telekom is a legit European company

play06:28

that has to obey the Data Protection Law, the same way as Telef贸nica.

play06:32

Telef贸nica, here, has to obey the data protection laws,

play06:35

but it's not the same with the companies

play06:37

that make mobiles, operative systems,

play06:41

offer us "free" mails,

play06:44

give those apps that we download

play06:46

and ask us for access to a bunch of strange things, and we say,

play06:49

"They might need it for something."

play06:52

They need it to sell it.

play06:55

Why would Angry Birds want to have access to your GPS?

play06:58

To make money!

play07:01

Our observers don't care if we are nobody,

play07:05

if we are unimportant,

play07:07

because they're algorithms, not people.

play07:09

And our profiles are automatic;

play07:10

they exist even if nobody looks at it.

play07:12

And the day somebody looks at it and changes your fate,

play07:15

your profile, your history, becomes your record.

play07:19

You can end up being stuck at the airport

play07:22

in one of the 75 countries where being homosexual is illegal.

play07:26

Or you could end up in a country where taking a picture of a pharmacy

play07:29

of mass production from the other side of the street is terrorism;

play07:33

this happens in the United States.

play07:35

Or you could end up in Syria, where people are shot on the streets;

play07:39

activists, especially journalists.

play07:41

You could end up in Mexico, D.F., where the Zetas use their access

play07:46

to the information of phone companies

play07:49

to see who contacts the police and cut their heads.

play07:52

There are thousands of ways to be in the wrong place at the wrong time,

play07:55

and sometimes you don't even have to move.

play07:58

In Holland they had a census.

play08:00

It was a census that included religions with high devotion rates in the world.

play08:04

They wanted to know how many Protestants, Catholics, Jews they had

play08:08

to know how much money they had to put in each community,

play08:10

in each church or synagogue.

play08:13

What happened? When the Nazis came, they had their homework done.

play08:16

Only 10 percent of the Dutch Jews survived in the Second World War.

play08:20

If that database hadn't exist, the figures would've been very different.

play08:27

What I mean is that our problem isn't the NSA,

play08:31

neither our corrupt governments,

play08:32

neither ambitious companies that want to sell our data,

play08:37

neither bad people,

play08:38

and it has nothing to do with their intentions,

play08:41

nor with their bad intentions.

play08:42

The problem is that the very existence of that information

play08:46

makes us vulnerable in the ways that we can't anticipate right now.

play08:51

We have to put curtains in our houses;

play08:53

we can't expect that somebody will do it for us.

play08:56

We have to put them now.

play08:58

We have to start using cryptography in our mobiles,

play09:01

in our communications, in our computers.

play09:03

Start thinking twice every time someone offers us a reward card,

play09:06

and say, "Mmm..."

play09:09

Not only for us, because besides everything,

play09:11

this state of surveillance is one of the worst sicknesses

play09:14

that a democracy has.

play09:16

So, I invite you, upon your arrival back home,

play09:19

start using Tor,

play09:21

and if someone wants to see what you are doing,

play09:23

he should ask for a search warrant.

play09:25

Thank you very much.

play09:26

(Applause)

Rate This

5.0 / 5 (0 votes)

Related Tags
Digital SurveillancePrivacy ConcernsData RetentionMobile TrackingDemocracy IllsCryptographyTelecommunicationData PrivacySurveillance SocietyMalte SpitzBig Data