Your Private Medical Data isn’t So Private

People seem to misunderstand the Health Insurance Portability and Accountability (HIPPA) Act. I often hear people citing HIPPA as proof that their medical data is private. However, misunderstandings aren’t reality. Your medical data isn’t private. In fact, it’s for sale:

Your medical data is for sale – all of it. Adam Tanner, a fellow at Harvard’s institute for quantitative social science and author of a new book on the topic, Our Bodies, Our Data, said that patients generally don’t know that their most personal information – what diseases they test positive for, what surgeries they have had – is the stuff of multibillion-dollar business.

The trick is that the data is “anonymized” before it is sold. I used quotation marks in that case because anonymized can mean different things to different people. To me, anonymized means the data has been scrubbed in such a way that it cannot be tied to any individual. This is a very difficult standard to meet though. To others, such as those who are selling your medical data, anonymized simply means replacing the name, address, and phone number of a patient with an identifier. But simply removing a few identifiers doesn’t cut it in the age of big data:

But other forms of data, such as information from fitness devices and search engines, are completely unregulated and have identities and addresses attached. A third kind of data called “predictive analytics” cross-references the other two and makes predictions about behavior with what Tanner calls “a surprising degree of accuracy”.

None of this technically violates the health insurance portability and accountability act, or Hipaa, Tanner writes. But the techniques do render the protections of Hipaa largely toothless. “Data scientists can now circumvent Hipaa’s privacy protections by making very sophisticated guesses, marrying anonymized patient dossiers with named consumer profiles available elsewhere – with a surprising degree of accuracy,” says the study.

With the vast amount of data available about everybody it’s not as difficult to identify who “anonymized” data applies to as most people think.

HIPPA was written by an organization that hates privacy so it’s not surprising to see that the law failed to protect anybody’s privacy. This is also the why legislation won’t fix this problem. The only way to fix this problem is to either incentivize medical professionals to keep patient data confidential or to give exclusive control of a patient’s data to that patient.

The Double Edged Sword of Body Cameras

As the public’s trust in law enforcers diminished demands were made to monitor working police officers. These demands resulted in calls for making officers wear body cameras that recorded their actions while they worked. In response many law enforcement agencies started buying body cameras and issuing them to the police. This satiated many peoples’ demands for police monitoring but some of us pointed out the limited utility of body cameras due to the fact that the departments usually controlled the footage. So long as body camera footage isn’t made available to the public in some manner it’s far too easy for departments to make any footage that incriminates their officers disappear down a memory hole.

Since no standards exist regarding the availability of police body camera footage states, counties, and cities are making up their own rules as they go. Locally a Hennepin County judge recently ruled that police body camera footage is off limits to the public:

So Hennepin prosecutors met with the chief judge and representatives of the Hennepin Public Defender’s Office, which handles 45,000 cases a year. The result was Bernhardson’s order, which asserts that prosecutors and defense attorneys have to follow the guidelines of the law, which save for “certain narrow exceptions,” classifies body camera video as off-limits to the public.

As the article points out, there are some difficult privacy questions regarding police body camera footage. However, body cameras are of limited use if such footage is classified as off-limits to the public. Under such a system body cameras allow law enforcers to use the footage as evidence against the people they arrest but don’t allow the public to use the footage to hold bad law enforcers accountable.

This lopsided policy shouldn’t surprise anybody. Law enforcement departments wouldn’t willingly adopt body cameras if they could realistically be used to hold officers accountable. But they would jump at the chance to use such devices to prosecute more people because then body cameras are a revenue generator instead of a liability. The State, having an interest in appeasing its revenue generators, has been more than happy to give law enforcers a ruleset that gives them the benefits of body cameras without the pesky downsides.

What does this mean for the general public? It means everybody should record, and preferably livestream, every police encounter they are either a party to or come across.

The Privacy Arms Race

Big Brother is watching. Many people have been defeated by the constant improvements in government surveillance. Instead of fighting they lie themselves into complacency by claiming that they have nothing to hide. Don’t allow yourself to fall into that trap. Privacy is an arms race. As surveillance technology improves so do countermeasures:

The use of facial recognition software for commercial purposes is becoming more common, but, as Amazon scans faces in its physical shop and Facebook searches photos of users to add tags to, those concerned about their privacy are fighting back.

Berlin-based artist and technologist Adam Harvey aims to overwhelm and confuse these systems by presenting them with thousands of false hits so they can’t tell which faces are real.

The Hyperface project involves printing patterns on to clothing or textiles, which then appear to have eyes, mouths and other features that a computer can interpret as a face.

Camouflage is older than humans. In fact, much of what we know about camouflage comes from our observations of animals. As predators improved so did the camouflage of prey. To win against the predatory State we must constantly improve our defenses. Against surveillance one of the best defenses is camouflage.

I admire people like Adam Harvey because they’re on the front lines. Will their plans work? Only time will tell. But I’ll take somebody who is trying to fight the good fight and fails over somebody who has rolled over and surrendered to the State any day.

Capitalism Versus Socialism

One of the biggest criticisms socialists make against capitalism is that under capitalism a poor individual may starve. But under socialism a poor individual… may starve:

PUERTO CABELLO, Venezuela (AP) – When hunger drew tens of thousands of Venezuelans to the streets last summer in protest, President Nicolas Maduro turned to the military to manage the country’s diminished food supply, putting generals in charge of everything from butter to rice.

But instead of fighting hunger, the military is making money from it, an Associated Press investigation shows. That’s what grocer Jose Campos found when he ran out of pantry staples this year. In the middle of the night, he would travel to an illegal market run by the military to buy corn flour – at 100 times the government-set price.

Queue all of the socialists claiming Venezuela isn’t real socialism. But the military is part of the State and therefore it having a “legitimate” monopoly on food distribution most certainly is socialism.

Scarcity is a law of nature. Because of that, no system can guarantee that every individual will receive everything they need to survive. Socialists claim that they can overcome this rule of nature but socialists countries have been proving them wrong time and again.

The difference between capitalism and socialism is how wealth is distributed. Under capitalism wealth is distributed by one’s ability to serve the market. If you are able to serve the market successfully you can obtain wealth. Under socialism wealth is distributed by one’s favor with the State. If you can curry favor with the State you can obtain wealth.

Neither system can prevent starvation or nefarious people from obtaining wealth. But the former relies on pleasing the masses whereas the latter relies on pleasing the elites in power. To me it seems rather obvious which is more ripe for abuse.

The Walls Have Ears

Voice activated assistances such as the Amazon Echo and Google Home are becoming popular household devices. With a simple voice command these devices can allow you to do anything from turning on your smart lightbulbs to playing music. However, any voice activated device must necessarily be listening at all times and law enforcers know that:

Amazon’s Echo devices and its virtual assistant are meant to help find answers by listening for your voice commands. However, police in Arkansas want to know if one of the gadgets overheard something that can help with a murder case. According to The Information, authorities in Bentonville issued a warrant for Amazon to hand over any audio or records from an Echo belonging to James Andrew Bates. Bates is set to go to trial for first-degree murder for the death of Victor Collins next year.

Amazon declined to give police any of the information that the Echo logged on its servers, but it did hand over Bates’ account details and purchases. Police say they were able to pull data off of the speaker, but it’s unclear what info they were able to access.

While Amazon declined to provide any server side information logged by the Echo there’s no reason a court order couldn’t compel Amazon to provide such information. In addition to that, law enforcers also managed to pull some unknown data locally from the Echo. Those two points raise questions about what kind of information devices like the Echo and Home collect as they’re passively sitting on your counter awaiting your command.

As with much of the Internet of Things, I haven’t purchased one of these voice activated assistances yet and have no plans to buy one anytime in the near future. They’re too big of a privacy risk for my tastes since I don’t even know what kind of information they’re collecting as they sit there listening.

The Planes Have Ears

While a bunch of nationalists continue to call Snowden a traitor and demand he return to the United States for execution the rest of us are looking at the material he provided about the criminal organization he worked for as a contractor. Through the information he provided we’ve learned a great deal about how the National Security Agency (NSA) has been abusing its power to surveil the American public. Whether on the ground, on the sea, or in the air the NSA is spying on you:

IN THE TROVE of documents provided by former National Security Agency contractor Edward Snowden is a treasure. It begins with a riddle: “What do the President of Pakistan, a cigar smuggler, an arms dealer, a counterterrorism target, and a combatting proliferation target have in common? They all used their everyday GSM phone during a flight.”

This riddle appeared in 2010 in SIDtoday, the internal newsletter of the NSA’s Signals Intelligence Directorate, or SID, and it was classified “top secret.” It announced the emergence of a new field of espionage that had not yet been explored: the interception of data from phone calls made on board civil aircraft. In a separate internal document from a year earlier, the NSA reported that 50,000 people had already used their mobile phones in flight as of December 2008, a figure that rose to 100,000 by February 2009. The NSA attributed the increase to “more planes equipped with in-flight GSM capability, less fear that a plane will crash due to making/receiving a call, not as expensive as people thought.” The sky seemed to belong to the agency.

In a 2012 presentation, Government Communications Headquarters, or GCHQ, the British equivalent of the NSA, in turn disclosed a program called “Southwinds,” which was used to gather all the cellular activity, voice communication, data, metadata, and content of calls on board commercial aircraft. The document, designated “top secret strap,” one of the highest British classification levels, said the program was still restricted to the regions covered by satellites from British telecommunications provider Inmarsat: Europe, the Middle East, and Africa.

I vaguely remember something about some bill listing some supposed rights. If I remember correctly one of the items on that list mentioned something about a right to being protected from unwarranted searches.

Anybody who is even moderately well read on history knows that national surveillance apparatuses are generally developed under the guise of surveilling external threats but always end up being used to surveil the nation’s own people. This is why privacy advocates tend to have a zero tolerance policy in regards to national surveillance efforts. It is also why only a fool would support such efforts.

What Snowden did wasn’t traitorous, it was an attempt to bring some accountability to the unaccountable. The NSA has been performing untargeted searches. Untargeted searches necessarily means no warrants have been issued, which means these searches of the American people are in violation of the language of the Fourth Amendment. This is why it amuses me when self-proclaimed constitutionalists call for Snowden’s head. It is also why I’m amused by people who claim that the Constitution is a protection against the government’s power. To quote Lysander Spooner, “But whether the Constitution really be one thing, or another, this much is certain – that it has either authorized such a government as we have had, or has been powerless to prevent it. In either case it is unfit to exist.”

Everything Old is New Again

During the Cold War Senator Joe McCarthy believed that the Soviets had infiltrated every branch of the United States government. Unhappy by the prospect of evil communists infiltrating his beloved fascist government, McCarthy decided to do the only thing he knew how to do, perform witch hunts. He made the lives of many people miserable all because he didn’t want international socialists in his national socialist government.

Those who don’t remember history are doomed to repeat it. Those who do remember history are doomed to watch everybody else repeat it:

On Tuesday, Democratic Whip Steny Hoyer (D-Md.) and six ranking members of major House committees sent President Obama a letter declaring, “We are deeply concerned by Russian efforts to undermine, interfere with, and even influence the outcome of our recent election.”

A prominent signer of the letter — Rep. Adam Schiff (D-Calif.), the ranking member of the House Intelligence Committee — is among the Democrats most eager to denounce Russian subversion.

A week ago, when the House approved by a 390-30 margin and sent to the Senate the Intelligence Authorization Act for fiscal 2017, Schiff praised “important provisions aimed at countering Russia’s destabilizing efforts — including those targeting our elections.” One of those “important provisions,” Section 501, sets up in the executive branch “an interagency committee to counter active measures by the Russian Federation to exert covert influence.”

The only difference between the beginning of this story and the beginning of McCarthy’s story is that in this revision Russia isn’t a communist nation anymore.

If you read the document you’ll see that it tasks the committee with nebulous responsibilities that are vague enough to mean anything. My favorite responsibility is probably dealing with media manipulation. It must be noted that the document is tasking the committee with specifically countering Russian media manipulation, not manipulation performed by the United States government because that form of manipulation is doubleplusgood. What this requirement will boil down to is any media reports that aren’t favorable to the interests of the United States will likely be called Russian influence and dealt with accordingly. I’m sure there are a lot of journalists out there that will find themselves under federal investigation, probably of the secret variety, because they reported the wrong side of a story.

After the conclusion of the Cold War you might have expected the United States to chill the fuck out. With its only credible adversary out of the picture the United States could stop living in a constant state of fear. Instead it sought high and low for a new threat. Many were tried; Iran, al Qaeda, Iraq, etc.; but it quickly became obvious that the hole in the United States’ heart could only be filled by Russia. So here we are, decades after the fall of the Soviet Union, still looking to hold witch trails on account of Russia.

Nothing changes.

So Much for Farook’s Phone

Shortly after the attack in San Bernardino the Federal Bureau of Investigations (FBI) tried to exploit the tragedy in order to force Apple to assist it in unlocking Syed Rizwan Farook’s iPhone. According to the FBI Farook’s phone likely contained information that would allow them to find his accomplices, motives, and basically solve the case. Apple refused to give the FBI the power to unlock any iPhone 5C willy nilly but the agency eventually found a third party that had an exploit that would allow the built-in security to be bypassed.

One year later the FBI hasn’t solved the case even with access to Farook’s iPhone:

They launched an unprecedented legal battle with Apple in an effort to unlock Farook’s iPhone and deployed divers to scour a nearby lake in search of electronic equipment the couple might have dumped there.

But despite piecing together a detailed picture of the couple’s actions up to and including the massacre, federal officials acknowledge they still don’t have answers to some of the critical questions posed in the days after the Dec. 2, 2015, attack at the Inland Regional Center.

Most important, the FBI said it is still trying to determine whether anyone was aware of the couple’s plot or helped them in any way. From the beginning, agents have tried to figure out whether others might have known something about Farook and Malik’s plans, since the couple spent months gathering an arsenal of weapons and building bombs in the garage of their Redlands home.

Officials said they don’t have enough evidence to charge anyone with a crime but stressed the investigation is still open.

This shouldn’t be surprising to anybody. Anybody who had the ability to plan out an attack like the one in San Bernardino without being discovered probably had enough operational security to not use an easily surveilled device such as a cellular phone for the planning. Too many people, including those who should know better, assume only technological wizards have the knowhow to plan things without using commonly surveilled communication methods. But that’s not the case. People who are committed to pulling off a planned attack that includes coordination with third parties are usually smart enough to do their research and utilize communication methods that are unlikely to be accessible to prying eyes. It’s not wizardry, it’s a trick as old as human conflict itself.

Humans are both unpredictable and adaptable, which is what makes mass surveillance useless. When an agency such as the National Security Agency (NSA) performs mass surveillance they get an exponentially greater amount of noise than signal. We’re not even talking about a 100:1 ratio. It would probably be closer to 1,000,000,000,000:1. Furthermore, people with enough intelligence to pull off coordinated attacks are usually paranoid enough to assume the most commonly available communication mechanisms are being surveilled so they adapt. Mass surveillance works well if you want a lot of grandmothers’ recipes, Internet memes, and insults about mothers made by teenagers. But mass surveillance is useless if you’re trying to identify individuals who are a significant threat. Sure, the NSA may get lucky once in a while and catch somebody but that’s by far the exception, not the rule. The rule, when it comes to identifying and thwarting significant threats, is that old fashioned investigative techniques must be employed.

Paving the Way for Trump

The once positive aspect of Trump being elected, other than the fact that I can actually still find standard capacity magazines, is that self-identified leftists are learning the value of limited government (don’t worry, I’m sure this will pass when their guys gets in just like last time). They’re finally understanding some of the threats that libertarians have been warning about for decades. Adding insult to injury, their guy that currently occupies the Oval Office is busy paving the way for Trump:

For years now, we’ve written about how the Obama administration has regularly rewritten the dictionary in order to pretend that the Authorization to Use Military Force (AUMF) hastily granted by Congress in the wake of 9/11 enabled him to go to war with basically anyone. If you don’t recall, the AUMF granted the President the power to use “all necessary and appropriate force” to go after those who “planned, authorized, committed or aided the terrorist attacks that occurred on September 11, 2001.” That’s already fairly broad, but over the years basically our entire government has pretended that (1) the AUMF included the ability to also target “associated forces” (even though it does not) and (2) it allowed the President to simply lump in anyone he wanted as an “associated force” allowing him to bomb them without any Congressional authorization. This is how you get a war without end, in which the explicit authorization to go after Al Qaeda is now being used on a surprisingly long list of groups that didn’t even exist in 2001.

And, just a few days ago, President Obama expanded the list yet again, allowing himself to go after yet another group: Shabab. Now, no one is trying to claim that Shabab, or ISIS or any other group that has been added to the list aren’t out to do serious harm to the US. But, this seems to go way beyond the basic functions of the office of the President and the simple Constitutional requirement for Congress to declare war.

If you mistakenly believe that the Democratic and Republican parties are opponents then you may find Obama’s actions a bit confusing. After all, why would he further expand presidential powers if he knew somebody like Trump was going to take the office in a month? The fact is that both parties are on the same side, which is a fact missed by self-identified leftists.

Remember when George Bush Jr. was in office? As he declared war on Iraq, signed the PATRIOT Act, and otherwise expanded the State’s power the anti-war left was having fits. They were actively out protesting. In fact public opinion was enough against Bush’s actions that Obama was able to openly campaign against those powers. During his first presidential run Obama promised to end the wars, curtail the State’s war powers, close Guantanamo Bay, and much more. Then he was elected. He followed through with none of his promises. In fact, he expanded the number of countries that the United States was bombing and further expanded the powers that Bush’s started implementing. Unfortunately, because their guy was in office, the anti-war left vanished. And now their guy is further expanding the powers of his office even though it will soon be occupied by somebody from the other team.

The anti-war left starting to come out of the woodwork again because their guy won’t be in power for much longer. But they’ll vanish again when their guy gets back in the White House. So long as you allow yourself to believe that the Democratic and Republican parties are opponents you’ll be suckered into a vicious cycle that requires willfully ignoring horrendous acts when somebody you side with is performing them and strongly protesting the very same acts when somebody you don’t side with is in power. If you have any principles at all you need to abandon this infantile notion that there are two major political parties in this country and accept the fact that both parties are working together to solidify their power.

Jurisdiction is Dead

It seems like every cop show or movie involves the protagonist’s very competent and morally upstanding department fighting with an incompetent immoral law enforcement agency over jurisdiction. Eventually this fight is taken before a judge who rules in favor of the protagonist’s department.

Jurisdiction is supposed to curtail the power of any single agency by only granting them a specific area in which they are allowed to operate. That concept has been dying as the federal government has continuously expanded its jurisdiction. But today that concept of jurisdiction died completely:

Democratic Senator Ron Wyden attempted three times to delay the changes, which will take effect on Thursday and allow U.S. judges will be able to issue search warrants that give the FBI the authority to remotely access computers in any jurisdiction, potentially even overseas. His efforts were blocked by Senator John Cornyn of Texas, the Senate’s second-ranking Republican.

The changes will allow judges to issue warrants in cases when a suspect uses anonymizing technology to conceal the location of his or her computer or for an investigation into a network of hacked or infected computers, such as a botnet.

Magistrate judges can currently only order searches within the jurisdiction of their court, which is typically limited to a few counties.

This rule change, as most expansions of governmental power are, was ultimately justified by a crime that almost everybody agrees is heinous. The Federal Bureau of Investigations (FBI), using a child pornography site it was hosting, ended up hacking computers in 120 countries off of a single warrant so the question of jurisdiction came up. Instead of slapping the FBI down to protect everybody’s civil rights (because these powers start with heinous crimes but end up being using for petty crimes such as cannabis usage) the rules were changed to make any future shenanigans like this completely legal.

Of course, this is nothing new. The State always rewrites rules that it finds inconvenient. This is the reason why the idea of a limited government is a fairytale.