Tag: surveillance

Doctors as Data Entry Clerks for the Government Health Surveillance System

As a practicing physician I have long been frustrated with the Electronic Health Record (EHR) system the federal government required health care practitioners to adopt by 2014 or face economic sanctions. This manifestation of central planning compelled many doctors to scrap electronic record systems already in place because the planners determined they were not used “meaningfully.” They were forced to buy a government-approved electronic health system and conform their decision-making and practice techniques to algorithms the central planners deem “meaningful.”  Other professions and businesses make use of technology to enhance productivity and quality. This happens organically. Electronic programs are designed to fit around the unique needs and goals of the particular enterprise. But in this instance, it works the other way around: health care practitioners need to conform to the needs and goals of the EHR. This disrupts the thinking process, slows productivity, interrupts the patient-doctor relationship, and increases the risk of error. As Twila Brase, RN, PHN ably details in “Big Brother in the Exam Room,” things go downhill from there.

With painstaking, almost overwhelming detail that makes the reader feel the enormous complexity of the administrative state, Ms. Brase, who is president and co-founder of Citizens’ Council for Health Freedom (CCHF), traces the origins and motives that led to Congress passing the Health Information Technology for Economic and Clinical Health (HITECH) Act in 2009. The goal from the outset was for the health care regulatory bureaucracy to collect the private health data of the entire population and use it to create a one-size-fits-all standardization of the way medicine is practiced. This standardization is based upon population models, not individual patients. It uses the EHR design to nudge practitioners into surrendering their judgment to the algorithms and guidelines adopted by the regulators. Along the way, the meaningfully used EHR makes practitioners spend the bulk of their time entering data into forms and clicking boxes, providing the regulators with the data needed to generate further standardization.

Brase provides wide-ranging documentation of the way this “meaningful use” of the EHR has led to medical errors and the replication of false information in patients’ health records. She shows how the planners intend to morph the Electronic Health Record into a Comprehensive Health Record (CHR), through the continual addition of new data categories, delving into the details of lifestyle choices that may arguably relate indirectly to health: from sexual proclivities, to recreational behaviors, to gun ownership, to dietary choices. In effect, a meaningfully used Electronic Health Record is nothing more than a government health surveillance system.  As the old saying goes, “He who pays the piper calls the tune.” If the third party—especially a third party with the monopoly police power of the state—is paying for health care it may demand adherence to lifestyle choices that keep costs down.

All of this data collection and use is made possible by the Orwellian-named Health Insurance Portability and Accountability Act (HIPAA) of 1996.  Most patients think of HIPAA as a guarantee that their health records will remain private and confidential. They think all those “HIPAA Privacy” forms they are signing at their doctor’s office is to insure confidentiality. But, as Brase points out very clearly, HIPAA gives numerous exemptions to confidentiality requirements for the purposes of collecting data and enforcing laws. As Brase puts it, 

 It contains the word privacy, leaving most to believe it is what it says, rather than reading it to see what it really is. A more honest title would be “Notice of Federally Authorized Disclosures for Which Patient Consent Is Not Required.”

Surveillance Tech Still a Concern After Carpenter

Last week the Supreme Court issued its ruling in Carpenter v. United States, with a five-member majority holding that the government’s collection of at least seven days-worth of cell site location information (CSLI) is a Fourth Amendment search. The American Civil Liberties Union’s Nathan Wessler and the rest of Carpenter’s team deserve congratulations; the ruling is a win for privacy advocates and reins in a widely used surveillance method. But while the ruling is welcome it remains narrow, leaving law enforcement with many tools that can be used to uncover intimate details about people’s private lives without a warrant, including persistent aerial surveillance, license plate readers, and facial recognition.

Background 

Timothy Carpenter and others were involved in a string of armed robberies of cell phone stores in Michigan and Ohio in 2010 and 2011. Police arrested four suspects in 2011. One of these suspects identified 15 accomplices and handed over some of their cell phone numbers to the Federal Bureau of Investigation. Carpenter was one of these accomplices.

Prosecutors sought Carpenter’s cell phone records pursuant to the Stored Communications Act. They did not need to demonstrate probable cause (the standard required for a search warrant). Rather, they merely had to demonstrate to judges that they had “specific and articulable facts showing that there are reasonable grounds to believe” that the data they sough were “relevant and material to an ongoing criminal investigation.”

Carpenter’s two wireless carriers, MetroPCS and Sprint, complied with the judges’ orders, producing 12,898 location points over 127 days. Using this information prosecutors were able to charge Carpenter with a number of federal offenses related to the armed robberies. 

Keep Facial Recognition Away From Body Cameras

The Chinese tech giant Alibaba recently invested $600 million in a start-up that specializes in facial and object recognition. Thanks to the investment the start-up, SenseTime, is now the world’s most valuable artificial intelligence start-up. Although such technology undoubtedly has potential when it comes to picking up your morning coffee and easing congestion at metro ticket lines, it has been making news in China because it is playing an increasingly prevalent role in that country’s growing surveillance state. While the Chinese are leaders in surveillance technology innovation, we should keep in mind that facial recognition in the U.S. also poses a unique and significant threat to privacy, and it’s a threat that is not being adequately addressed.

Facial recognition fits in the family tree of biometric investigatory technologies, which determine identity via analysis of unique biological and physical traits. Many are familiar to anyone who watches CSI shows or other fictional portrayals of law enforcement: fingerprint and DNA analysis are a couple of examples.

If law enforcement has access to your fingerprints it’s likely because you volunteered them as part of a job requirement, you’re an immigrant, they were recorded after you were arrested, or they were collected at a crime scene. About 40 percent of fingerprints in the FBI’s fingerprint database are not related to arrests or forensic investigations. The FBI’s DNA database only includes DNA related to criminal arrests or forensic investigations.

Unlike databases for fingerprints and DNA, one of the FBI’s facial recognition services allows agents to search through databases that mostly include information related to law-abiding Americans, with only 8 percent of the facial images in the network being associated with criminal or forensic investigations. This is in part thanks to the fact that the FBI has access to drivers license photos from at least 16 states as well as passport photos from the State Department. All told, this Facial Analysis Comparison and Evaluation services allows the FBI to access more than 411 million facial images. A Georgetown study on facial recognition estimates that about half of American adults can be found in a law enforcement facial recognition network.

This is especially concerning because facial recognition can be used to conduct surveillance. It’s already being used for the purpose in China, and here in the U.S. the law enforcement community seems poised to spread the use of facial recognition without sufficient limitations in place.

ICE Doesn’t Belong in the Intelligence Community

Some officials at Immigration and Customs Enforcement (ICE) are reportedly looking into the agency joining the Intelligence Community (IC). Making ICE, which is responsible to deportations, a member of the IC would be a mistake, putting our civil liberties at risk by giving the agency increased access to vast troves of information not related to immigration enforcement.

ICE officials have been pushing for this change since the Obama administration, but the close relationship between intelligence agencies and immigration enforcement officials is nothing new. Almost one hundred years ago, one of the most notorious set of deportations in American history occurred, thanks in large part to domestic law enforcement acting like a spy agency.

In 1919 followers of the Italian anarchist Luigi Galleani sent mail bombs to dozens of prominent public figures, including Attorney General Mitchell Palmer. Although the wannabe assassins failed to kill any of their intended targets, the bombings sparked the United States’ first “Red Scare.”

A Spying “Reform” That Makes Things Worse

Donald Trump’s whiplash-inducing Twitter comments about the surveillance legislation his administration had just endorsed didn’t stop the House of Representatives from approving a bill to reauthorize the FISA Amendments Act for another six years, but if you watched the floor debate, you might come away thinking civil libertarians won at least a few concessions in the process. Defenders of the statute’s controversial Section 702, which authorizes warrantless surveillance of foreigners’ communications, rejected a proposal to require FBI agents to seek a warrant before querying the vast 702 database for Americans’ communications—a practice critics have dubbed a “backdoor search”—but did accept a narrower warrant requirement for queries conducted for criminal investigations unrelated to national security. Is this, as the bill’s boosters repeatedly insistence, a “compromise” that should provide some small consolation to civil libertarians?

Alas, no. There’s a good reason you won’t find any privacy advocates cheering even a partial victory following Thursday’s vote.  First, as I noted back in October, such a narrow warrant requirement would do almost nothing to prevent abuses of the sort it’s most reasonable to worry about: historical abuses of spying power have nearly all been clothed in invocations of national security.  But it’s worse than that.  The limited warrant requirement in the House bill not only exempts a potpourri of ordinary crimes—among them any involving the risk of death or serious injury, cybersecurity, or offenses against minors—it applies only to what are known as “predicated” or “full” investigations.  

House Votes To Reauthorize FISA Section 702 Mass Surveillance Program

Two months of drama in the House of Representatives over the soon-to-expire FISA Section 702 mass surveillance program came to an end this morning, with a bipartisan group of House members first defeating a FISA reform amendment (USA RIGHTS Act) offered by Rep. Justin Amash (R-MI), then passing the GOP House leadership bill. The key votes in support of the GOP House leadership effort came from Democrats, including Minority Leader Nancy Pelosi (D-CA) and House Intelligence Committee Ranking Member Adam Schiff (D-CA).

The progressive activist group Demand Progress, which spearheaded the campaign on the political left for meaningful surveillance reforms, issued a blistering statement after the vote, the key paragraph of which follows:

Demand Progress has opposed the FISA Amendments Reauthorization Act from the start and has instead urged the House to pass strong reform legislation, like the USA RIGHTS Act, which was offered as an amendment but defeated 183-233, despite strong support from members of both parties. 55 Democrats voted against the amendment, where a swing of 26 votes would have meant its adoption and the protection of Americans’ privacy. The USA RIGHTS amendment would have enacted meaningful reforms to Section 702, which are imperative given the government’s historical abuse of surveillance authorities and the danger posed by future abuses.

Amash garnered 58 GOP votes for his amendment (offered with several other Democratic and Republican House members), by far his best showing since his first attempt to rein in federal mass surveillance programs in the summer of 2013, in the wake of Edward Snowden’s revelations. 

The FISA Amendments Act was first passed in 2008, when Pelosi was Speaker. In her floor speech in support of the FISA Amendments Act on June 20, 2008, Pelosi made this claim:

Some in the press have said that under this legislation, this bill would allow warrantless surveillance of Americans. That is not true. This bill does not allow warrantless surveillance of Americans. I just think we have to stipulate to some set of facts.

In fact, as Demand Progress noted in their 2017 report on Section 702, the FISA Court itself found the federal government had done exactly that in a number of cases. But as is so often the case in politics, it is emotion and perception, not facts and reason, that dominate debate on Capitol Hill. Today was another one of those days.

 

House FISA Reform Battle Enters Final Stage

Last night, the House Rules Committee made in order one alternative to the HPSCI FISA Sec. 702 reauthorization bill, the USA Rights Act. You can view the Rule here

The bill was originally introduced in the Senate by Ron Wyden (D-OR) and Rand Paul (R-KY). You can view a one-pager on the USA Rights Act here.  

None of this would have happened without the relentless effort of Rep. Justin Amash (R-MI) and a number of his House Freedom Caucus colleagues, who’ve made clear for some time that they would not support the reauthorization of the extremely controversial (and constitutionally dubious) FISA Sec. 702 mass surveillance program in its current form. Amash is an original cosponsor of the House version of the USA Rights Act. 

To be clear, the USA Rights Act is itself a significantly deficient surveillance reform measure. The bill does not require the IC/FBI to purge their databases of data on Americans not the subject of a criminal investigation, nor does it mandate the kind of GAO audits that are necessary to truly help end surveillance abuses. It also accepts the USG framing that 702 is necessary, legitimate, and effective—assertions I’ve challenged previously. 

Despite those serious flaws, the USA Rights Act is a vastly more comprehensive FISA Sec. 702 reform measure than every existing alternative. It restores the 4th Amendment probable cause standard for searches of the data of Americans stored on FBI or IC IT systems, and it makes it easier for innocent Americans to sue the federal government for unlawful spying. And precisely because it would, if enacted, give citizens more tools to discover if they are the targets of unlawful or politically-motivated surveillance, I expect the House GOP leadership to do everything possible to defeat it on the House floor, as will the IC/FBI. Even if the USA Rights Act passes, the House GOP leadership has shown time and again that they are willing to ignore the will of the House and strip out real surveillance reform measures in conference with the Senate, as I’ve explained elsewhere

All of which underscores a point I’ve made for years: traditional advocacy on surveillance issues has generally proven ineffectual in stopping, much less rolling back, post-9/11 surveillance powers that we know have been abused. The reason is simple. The groups that lobby on these issues do not engage in electoral politics—which means politicans can vote for more surveillance powers in the name of “public safety” without fear of organized, targeted political reprisal from Bill of Rights supporters. Until that dynamic changes, enduring surveillance reform will remain elusive.

Pages