Menus Subscribe Search
babbage-engine

The Babbage Analytical Engine, for which the first algorithm was designed. (PHOTO: GENI/WIKIMEDIA COMMONS)

5 Hidden Algorithms That Rule Your World

• November 12, 2013 • 8:00 AM

The Babbage Analytical Engine, for which the first algorithm was designed. (PHOTO: GENI/WIKIMEDIA COMMONS)

From the NSA to OKCupid.

If the 1990s were dominated by the rise of the Internet and the 2000s social media behemoths, perhaps the ’10s are the decade of the algorithm. The word is a kind of cypher for whatever is happening in the world of technology at the moment. A brief survey of recent stories on the subject includes a bridge designed by algorithm, a traffic-reducing algorithm, and a match-making algorithm.

But what is an algorithm, exactly?

An algorithm is a method of processing information, a step-by-step procedure that turns a certain set of data into something else—perhaps a smaller, filtered set of data, an outcome that’s more useful than the original for the user of the algorithm. It’s a process-driven equation, one that’s difficult to define except in vague terms.

The word itself has ancient roots. Muhammad ibn Musa al-Khwarizmi, a mathematician in Baghdad in the 9th century, is known as the creator of algebra, which stems from the word al-jabr, meaning completion, in the context of an equation. In Latin translation, he became Algorismus, which was synonymous with the decimal number system, which the mathematician introduced to the Western world. Algorism was the practice of doing arithmetic with those digits.

Compounding what you’ve previously searched with what other users search for every day, Google’s algorithms can predict what you’re looking for with a frightening degree of accuracy.

Algorithm’s modern usage came to the fore with the evolution of computers. Ada Lovelace was a British mathematician in the mid-19th century who worked with Charles Babbage’s analytical engines—the first computers—and is credited with creating the first computer program, an algorithm designed to calculate Bernoulli numbers, critical to the number theory field of mathematics.

Lovelace imagined that computers might one day do much more than determine numbers, however important. If the “science of harmony” could be calculated, she once wrote, “the engine might compose elaborate and scientific pieces of music of any degree of complexity or extent.”

But she couldn’t have known the degree to which algorithms would metastasize and come to take over our lives in the 21st century. Below, I introduce five modern algorithms that we should all be aware of, since they alter our technological landscape in much more insidious ways than the Babbage Engine ever did.

1. The NSA’s Surveillance Algorithm

The NSA’s surveillance programs work, or so they claim, by collecting metadata: not the content of your phone calls and emails, but their length, who they connect you to, and when they happen. This mass of metadata is filtered by the agency’s algorithms, which trawl through the collection for triggers that give them reason for further investigation, AKA requisitioning the content of the communications. These triggers could be certain keywords—“offensive information warfare,” “illuminati,” and “computer terrorism” to name a few—or the identities of the people you’re contacting.

In one of the few concrete examples of successful metadata surveillance, FBI Deputy Director Sean Joyce stated in June that a phone number in San Diego was found to be making calls to the terrorist group al-Shabab in Somalia. The agency traced the number to one man, and further surveillance connected him to three others who were conspiring to send money to the terrorist group. All four were arrested in 2010 and convicted early this year.

Of course, now that details about the algorithm have spread, there’s a good chance it will be less effective. Vice recently launched an NSA spam generator that spits out sentences full of trigger words for would-be surveillance disruptors to insert into their email and confuse the system.

2. Encryption Algorithms

Another way to combat surveillance is to confuse the algorithms—turning their own capabilities against them. Encryption algorithms encode your data, using a secret formula to turn it into an unreadable mass that entities like the NSA can’t process. That’s how post-PRISM services like Silent Circle and Least Authority protect their users’ phone calls and messages from snooping. But encryption algorithms have a very long history.

According to the Roman historian Suetonius, Julius Caesar used the “Caesar cipher” to encode his private correspondence. The algorithm worked by shifting each letter of the alphabet back several places—for example, every D would become an A, every J would become a G, and so on. The message could only be unencrypted if the receiver knew what the shift was. This is a simplistic, easily-broken algorithm, but the German Enigma machine, which was used to encode military texts after World War I, took almost two decades to crack. These days, the NSA just goes straight to the source: It spies on Angela Merkel’s cell phone.

3. Google Search

If you’ve ever had Google fill in the rest of your search text like a mind-reader, you’ve also experienced an algorithm at work. Compounding what you’ve previously searched with what other users search for every day, Google’s algorithms can predict what you’re looking for with a frightening degree of accuracy.

In fact, Google’s search algorithm, which is also referred to as PageRank, is one of the most powerful, secretive algorithms in the world of technology. In a visual explainer of how search works, Google notes that their algorithms “get to work looking for clues to better understand what you mean” by your search terms rather than just their literal content. They then use their formula to determine how relevant a certain page is to what you’re looking for, examining aspects like how often the site is updated and how well it’s connected to the rest of the Internet, putting the most useful links at the top of the search list.

Search-engine optimization (SEO) experts work to crack the code of this algorithm and get their clients’ sites to the top of the page. That’s a tough job, because the algorithm is always evolving, to the tune of 500 to 600 changes a year, to throw off cheaters and better serve searchers.

4. High-Frequency Trading Algorithms

In the heyday of Wall Street, traders shouted across exchange floors to buy and sell stocks. These days, it’s a whole lot quieter—around 50 percent of trading is done by firms specializing in “high-frequency trading” (HFT), which refers to rapid-fire share buys and sells carried out by computer programs rather than humans. Hedge funds that specialize in HFT develop proprietary algorithms to determine what they buy and sell and when, then the programs carry out those instructions in milli- or microseconds. These incredibly fast trades attempt to capitalize on volatile markets, buying before rises and selling before falls, however miniscule. The technology began its meteoric rise in the early ‘90s and became pervasive by 2010, but it’s not without its problems.

“Left unsupervised, algorithms can and will do strange things,” writes Christopher Steiner in his book Automate This: How Algorithms Came to Rule Our World. In 2012, a “rogue algorithm” belonging to the New York firm Knight Capital glitched out and went on an ill-advised 45-minute trading spree that resulted in a loss of $440 million before it was quickly stopped, Steiner writes. The Flash Crash of 2010, in which the Dow Jones Industrial Average lost 1,000 points in a few minutes only to recover the value 20 minutes later, was exacerbated by high-frequency trading. When the algorithms noticed the downswing in the market, firms depending on the programs sold aggressively to protect their investors. In fact, the strategy might be on its way out—France and Italy have both instituted taxes on light-speed trading, a law that the U.S. is considering as well.

5. OKCupid

Algorithms influence even our intimate relationships. The now-iconic surveys of OKCupid, the question-and-answer sessions the dating site spews out to help match its users, provide the data for the site’s compatibility algorithms. In order to calculate a match percentage between you and another person, the algorithm will factor in the results of the survey questions’ three aspects: what your answer is, what answer you’d like the other person to give, and how important the question is to you. In the computer program, those abstract values are assigned numbers, which are collated into a “match percentage.”

The company explains that if a person chooses the exact answer that you specify you want, they receive all of the matching points accorded to the level of importance you selected. So if you wanted a match to answer “How messy are you?” at the middle level of “Average,” and said that answer is “very important,” and the match chose that answer, the match would receive 50 out of 50 possible points. If they answered the question “Have you ever cheated in a relationship?” “Yes” but you specified a no answer at a very important level, they would receive zero out of 50 points.

As the question results mount up, those fractions are calculated into a final match percentage. For our hypothetical match, 50/50 plus 0/50 would amount to 50 out of 100 total points, or a miserable 50 percent compatibility rating. Ouch. No way an algorithm would go for that.

Algorithms might be pure math, but in all of these cases they are created and controlled by fallible human beings. These equations and data filters might be quietly influencing our lives, but that doesn’t mean we’re controlled by robot overlords: Imperfect humans create imperfect algorithms. In other words, you never know about that 50-percent match.

Kyle Chayka
Kyle Chayka is a freelance technology and culture writer living in Brooklyn. Follow him on Twitter @chaykak.

More From Kyle Chayka

A weekly roundup of the best of Pacific Standard and PSmag.com, delivered straight to your inbox.

Recent Posts

August 22 • 4:00 PM

The Invention of the Illegal Immigrant

It’s only fairly recently that we started to use the term that’s so popular right now.



August 22 • 2:00 PM

What Can U.S. Health Care Learn From the Ebola Outbreak?

A conversation with Jeanine Thomas, patient advocate, active member of ProPublica’s Patient Harm Facebook Community, and founder and president of the MRSA Survivors Network.


August 22 • 1:22 PM

Two Executions and the Unity of Mourning

The recent deaths of Michael Brown and James Foley, while worlds apart, are both emblematic of the necessity for all of us to fight to uphold the sanctity of human dignity and its enduring story.


August 22 • 10:00 AM

Turbo Paul: Art Thief Turned Art Crime Ombudsman

There’s art theft, there’s law enforcement, and, somewhere in between, there’s Turbo Paul.


August 22 • 8:00 AM

When Climate Change Denial Refutes Itself

The world is warming—and record-cold winters are just another symptom.


August 22 • 6:17 AM

The Impossibility of the Night Shift

Many night workers get “shift-work sleep disorder.” And no one knows how to treat it.


August 22 • 6:00 AM

Long Live Short Novels

Christopher Beha’s Arts & Entertainments comes in at less than 300 pages long, which—along with a plot centered on a sex-tape scandal—makes it a uniquely efficient pleasure.


August 22 • 4:00 AM

Why ‘Nature Versus Nurture’ Often Doesn’t Matter

Sometimes it just doesn’t make any sense to try to separate the social and the biological.


August 21 • 4:00 PM

Julie Chen Explains Why She Underwent Westernizing Surgery

The CBS news anchor and television personality’s story proves that cosmetic surgeries aren’t always vanity projects, even if they’re usually portrayed that way.


August 21 • 2:37 PM

How the Brains of Risk-Taking Teens Work

There’s heightened functional connectivity between the brain’s emotion regulator and reason center, according to a recent neuroscience paper.


August 21 • 2:00 PM

Cracking Down on the Use of Restraints in Schools

Federal investigators found that children at two Virginia schools were being regularly pinned down or isolated and that their education was suffering as a result.


August 21 • 12:00 PM

What Makes You So Smart, School Principal?

Noah Davis talks to Evan Glazer about why kids aren’t getting smarter and what his school’s doing in order to change that.



August 21 • 10:00 AM

Why My Neighbors Still Use Dial-Up Internet

It’s not because they want to. It’s because they have no other choice.


August 21 • 8:15 AM

When Mothers Sing, Premature Babies Thrive

Moms willing to serenade pre-term infants help their babies—and themselves.


August 21 • 8:00 AM

To Fight the Obesity Epidemic Americans Will Have to First Recognize That They’re Obese

There is a void in the medical community’s understanding of how families see themselves and understand their weight.


August 21 • 6:33 AM

One Toxic Boss Can Poison the Whole Workplace

Office leaders who bully even just one member of their team harm everyone.


August 21 • 6:00 AM

The Fox News Effect

Whatever you think of its approach, Fox News has created a more conservative Congress and a more polarized electorate, according to a series of recent studies.


August 21 • 4:00 AM

Do Children Help Care for the Family Pet?

Or does mom do it all?


August 20 • 4:00 PM

Why Can’t Conservatives See the Benefits of Affordable Child Care?

Private programs might do a better job of watching our kids than state-run programs, but they’re not accessible to everyone.


August 20 • 2:00 PM

Oil and Gas Companies Are Illegally Using Diesel Fuel in Hundreds of Fracking Operations

An analysis by an environmental group finds hundreds of cases in which drillers used diesel fuel without obtaining permits and sometimes altered records disclosing they had done so.


August 20 • 12:00 PM

The Mystery of Britain’s Alien Big Cats

In a nation where the biggest carnivorous predator is a badger, why are there so many reported sightings of large cats?


August 20 • 10:00 AM

Death Row in Arizona: Where Human Experimentation Is the Rule, Not the Exception

Recent reports show that chemical roulette is the state’s M.O.


August 20 • 9:51 AM

Diversity Is in the Eye of the Beholder

Perception of group diversity depends on the race of the observer and the extent to which they worry about discrimination.


Follow us


The Impossibility of the Night Shift

Many night workers get “shift-work sleep disorder.” And no one knows how to treat it.

How the Brains of Risk-Taking Teens Work

There's heightened functional connectivity between the brain's emotion regulator and reason center, according to a recent neuroscience paper.

When Mothers Sing, Premature Babies Thrive

Moms willing to serenade pre-term infants help their babies—and themselves.

One Toxic Boss Can Poison the Whole Workplace

Office leaders who bully even just one member of their team harm everyone.

Diversity Is in the Eye of the Beholder

Perception of group diversity depends on the race of the observer and the extent to which they worry about discrimination.

The Big One

One in two full-time American fast-food workers' families are enrolled in public assistance programs, at a cost of $7 billion per year. July/August 2014 fast-food-big-one
Subscribe Now

Copyright © 2014 by Pacific Standard and The Miller-McCune Center for Research, Media, and Public Policy. All Rights Reserved.