Menus Subscribe Search
babbage-engine

The Babbage Analytical Engine, for which the first algorithm was designed. (PHOTO: GENI/WIKIMEDIA COMMONS)

5 Hidden Algorithms That Rule Your World

• November 12, 2013 • 8:00 AM

The Babbage Analytical Engine, for which the first algorithm was designed. (PHOTO: GENI/WIKIMEDIA COMMONS)

From the NSA to OKCupid.

If the 1990s were dominated by the rise of the Internet and the 2000s social media behemoths, perhaps the ’10s are the decade of the algorithm. The word is a kind of cypher for whatever is happening in the world of technology at the moment. A brief survey of recent stories on the subject includes a bridge designed by algorithm, a traffic-reducing algorithm, and a match-making algorithm.

But what is an algorithm, exactly?

An algorithm is a method of processing information, a step-by-step procedure that turns a certain set of data into something else—perhaps a smaller, filtered set of data, an outcome that’s more useful than the original for the user of the algorithm. It’s a process-driven equation, one that’s difficult to define except in vague terms.

The word itself has ancient roots. Muhammad ibn Musa al-Khwarizmi, a mathematician in Baghdad in the 9th century, is known as the creator of algebra, which stems from the word al-jabr, meaning completion, in the context of an equation. In Latin translation, he became Algorismus, which was synonymous with the decimal number system, which the mathematician introduced to the Western world. Algorism was the practice of doing arithmetic with those digits.

Compounding what you’ve previously searched with what other users search for every day, Google’s algorithms can predict what you’re looking for with a frightening degree of accuracy.

Algorithm’s modern usage came to the fore with the evolution of computers. Ada Lovelace was a British mathematician in the mid-19th century who worked with Charles Babbage’s analytical engines—the first computers—and is credited with creating the first computer program, an algorithm designed to calculate Bernoulli numbers, critical to the number theory field of mathematics.

Lovelace imagined that computers might one day do much more than determine numbers, however important. If the “science of harmony” could be calculated, she once wrote, “the engine might compose elaborate and scientific pieces of music of any degree of complexity or extent.”

But she couldn’t have known the degree to which algorithms would metastasize and come to take over our lives in the 21st century. Below, I introduce five modern algorithms that we should all be aware of, since they alter our technological landscape in much more insidious ways than the Babbage Engine ever did.

1. The NSA’s Surveillance Algorithm

The NSA’s surveillance programs work, or so they claim, by collecting metadata: not the content of your phone calls and emails, but their length, who they connect you to, and when they happen. This mass of metadata is filtered by the agency’s algorithms, which trawl through the collection for triggers that give them reason for further investigation, AKA requisitioning the content of the communications. These triggers could be certain keywords—“offensive information warfare,” “illuminati,” and “computer terrorism” to name a few—or the identities of the people you’re contacting.

In one of the few concrete examples of successful metadata surveillance, FBI Deputy Director Sean Joyce stated in June that a phone number in San Diego was found to be making calls to the terrorist group al-Shabab in Somalia. The agency traced the number to one man, and further surveillance connected him to three others who were conspiring to send money to the terrorist group. All four were arrested in 2010 and convicted early this year.

Of course, now that details about the algorithm have spread, there’s a good chance it will be less effective. Vice recently launched an NSA spam generator that spits out sentences full of trigger words for would-be surveillance disruptors to insert into their email and confuse the system.

2. Encryption Algorithms

Another way to combat surveillance is to confuse the algorithms—turning their own capabilities against them. Encryption algorithms encode your data, using a secret formula to turn it into an unreadable mass that entities like the NSA can’t process. That’s how post-PRISM services like Silent Circle and Least Authority protect their users’ phone calls and messages from snooping. But encryption algorithms have a very long history.

According to the Roman historian Suetonius, Julius Caesar used the “Caesar cipher” to encode his private correspondence. The algorithm worked by shifting each letter of the alphabet back several places—for example, every D would become an A, every J would become a G, and so on. The message could only be unencrypted if the receiver knew what the shift was. This is a simplistic, easily-broken algorithm, but the German Enigma machine, which was used to encode military texts after World War I, took almost two decades to crack. These days, the NSA just goes straight to the source: It spies on Angela Merkel’s cell phone.

3. Google Search

If you’ve ever had Google fill in the rest of your search text like a mind-reader, you’ve also experienced an algorithm at work. Compounding what you’ve previously searched with what other users search for every day, Google’s algorithms can predict what you’re looking for with a frightening degree of accuracy.

In fact, Google’s search algorithm, which is also referred to as PageRank, is one of the most powerful, secretive algorithms in the world of technology. In a visual explainer of how search works, Google notes that their algorithms “get to work looking for clues to better understand what you mean” by your search terms rather than just their literal content. They then use their formula to determine how relevant a certain page is to what you’re looking for, examining aspects like how often the site is updated and how well it’s connected to the rest of the Internet, putting the most useful links at the top of the search list.

Search-engine optimization (SEO) experts work to crack the code of this algorithm and get their clients’ sites to the top of the page. That’s a tough job, because the algorithm is always evolving, to the tune of 500 to 600 changes a year, to throw off cheaters and better serve searchers.

4. High-Frequency Trading Algorithms

In the heyday of Wall Street, traders shouted across exchange floors to buy and sell stocks. These days, it’s a whole lot quieter—around 50 percent of trading is done by firms specializing in “high-frequency trading” (HFT), which refers to rapid-fire share buys and sells carried out by computer programs rather than humans. Hedge funds that specialize in HFT develop proprietary algorithms to determine what they buy and sell and when, then the programs carry out those instructions in milli- or microseconds. These incredibly fast trades attempt to capitalize on volatile markets, buying before rises and selling before falls, however miniscule. The technology began its meteoric rise in the early ‘90s and became pervasive by 2010, but it’s not without its problems.

“Left unsupervised, algorithms can and will do strange things,” writes Christopher Steiner in his book Automate This: How Algorithms Came to Rule Our World. In 2012, a “rogue algorithm” belonging to the New York firm Knight Capital glitched out and went on an ill-advised 45-minute trading spree that resulted in a loss of $440 million before it was quickly stopped, Steiner writes. The Flash Crash of 2010, in which the Dow Jones Industrial Average lost 1,000 points in a few minutes only to recover the value 20 minutes later, was exacerbated by high-frequency trading. When the algorithms noticed the downswing in the market, firms depending on the programs sold aggressively to protect their investors. In fact, the strategy might be on its way out—France and Italy have both instituted taxes on light-speed trading, a law that the U.S. is considering as well.

5. OKCupid

Algorithms influence even our intimate relationships. The now-iconic surveys of OKCupid, the question-and-answer sessions the dating site spews out to help match its users, provide the data for the site’s compatibility algorithms. In order to calculate a match percentage between you and another person, the algorithm will factor in the results of the survey questions’ three aspects: what your answer is, what answer you’d like the other person to give, and how important the question is to you. In the computer program, those abstract values are assigned numbers, which are collated into a “match percentage.”

The company explains that if a person chooses the exact answer that you specify you want, they receive all of the matching points accorded to the level of importance you selected. So if you wanted a match to answer “How messy are you?” at the middle level of “Average,” and said that answer is “very important,” and the match chose that answer, the match would receive 50 out of 50 possible points. If they answered the question “Have you ever cheated in a relationship?” “Yes” but you specified a no answer at a very important level, they would receive zero out of 50 points.

As the question results mount up, those fractions are calculated into a final match percentage. For our hypothetical match, 50/50 plus 0/50 would amount to 50 out of 100 total points, or a miserable 50 percent compatibility rating. Ouch. No way an algorithm would go for that.

Algorithms might be pure math, but in all of these cases they are created and controlled by fallible human beings. These equations and data filters might be quietly influencing our lives, but that doesn’t mean we’re controlled by robot overlords: Imperfect humans create imperfect algorithms. In other words, you never know about that 50-percent match.

Kyle Chayka
Kyle Chayka is a freelance technology and culture writer living in Brooklyn. Follow him on Twitter @chaykak.

More From Kyle Chayka

A weekly roundup of the best of Pacific Standard and PSmag.com, delivered straight to your inbox.

Recent Posts

July 25 • 6:00 AM

Men Find Caring, Understanding Responses Sexy. Women, Not So Much

For women looking to attract a man, there are advantages to being a caring conversationalist. But new research finds it doesn’t work the other way around.


July 25 • 4:00 AM

Arizona’s Double-Talk on Execution and Torture

The state is certain that Joseph Wood’s death was totally constitutional. But they’re looking into it.


July 24 • 4:00 PM

Overweight Americans Have the Lowest Risk of Premature Death

Why do we use the term “normal weight” when talking about BMI? What’s presented as normal certainly isn’t the norm, and it may not even be what’s most healthy.


July 24 • 2:00 PM

California’s Lax Policing of the Fracking Industry Has Put the Drought-Stricken State in a Terrible Situation

The state’s drought has forced farmers to rely on groundwater, even as aquifers have been intentionally polluted due to exemptions for the oil industry.


July 24 • 12:00 PM

What’s in a Name? The Problem With Washington’s Football Team

A senior advisor to the National Congress of American Indians once threw an embarrassing themed party that involved headdresses. He regrets that costume now, but knows his experience is one many others can relate to.


July 24 • 11:00 AM

How Wildlife Declines Are Leading to Slavery and Terrorism

As wildlife numbers dwindle, wildlife crimes are rising—and that’s fueling a raft of heinous crimes committed against humans.


July 24 • 10:58 AM

How the Supremes Pick Their Cases—and Why Obamacare Is Safe for Now

The opponents of Obamacare who went one for two in circuit court rulings earlier this week are unlikely to see their cases reach the Supreme Court.



July 24 • 9:48 AM

The People Who Are Scared of Dogs

While more people fear snakes or spiders, with dogs everywhere, cynophobia makes everyday public life a constant challenge.


July 24 • 8:00 AM

Newton’s Needle: On Scientific Self-Experimentation

It is all too easy to treat science as a platform that allows the observer to hover over the messiness of life, unobserved and untouched. But by remembering the role of the body in science, perhaps we humanize it as well.


July 24 • 6:00 AM

Commercializing the Counterculture: How the Summer Music Festival Went Mainstream

With painted Volkswagen buses, talk of “free love,” and other reminders of the Woodstock era replaced by advertising and corporate sponsorships, hippie culture may be dying, but a new subculture—a sort of purgatory between hipster and hippie—is on the rise.


July 24 • 5:00 AM

In Praise of Our Short Attention Spans

Maybe there’s a good reason why it seems like there’s been a decline in our our ability to concentrate for a prolonged period of time.


July 24 • 4:00 AM

How Stereotypes Take Shape

New research from Scotland finds they’re an unfortunate product of the way we process and share information.


July 23 • 4:00 PM

Who Doesn’t Like Atheists?

The Pew Research Center asked Americans of varying religious affiliations how they felt about each other.


July 23 • 2:00 PM

We Need to Start Tracking Patient Harm and Medical Mistakes Now

Top patient-safety experts call on Congress to step in and, among other steps, give the Centers for Disease Control and Prevention wider responsibility for measuring medical mistakes.


July 23 • 12:19 PM

How a CEO’s Fiery Battle Speeches Can Shape Ethical Behavior

CEO war speech might inspire ethical decisions internally and unethical ones among competing companies.


July 23 • 12:00 PM

Why Do We Love the ‘Kim Kardashian: Hollywood’ Game?

It’s easy enough to turn yourself into a virtual celebrity, complete with fame and mansions—but it will likely cost you.


July 23 • 11:49 AM

Modern Technology Still Doesn’t Protect Americans From Deadly Landslides

No landslide monitoring or warning systems are being used to protect vulnerable communities.


July 23 • 10:00 AM

Outing the Death-Drug Distributors

Calling all hackers: It’s time to go Assange on capital punishment.


July 23 • 8:00 AM

The Surprising Appeal of Products That Require Effort to Use

New research finds they enable consumers to re-establish a feeling that they’re in control of their lives.



July 23 • 6:00 AM

How the Other Half Lifts: What Your Workout Says About Your Social Class

Why can’t triathletes and weightlifters get along?


July 23 • 5:02 AM

Battle of the Public Intellectuals: Edward Glaeser vs. Richard Florida

On gentrification and housing costs.


July 23 • 4:00 AM

Our Fear of Immigrants

Why did a group of fourth graders rally in support of an undocumented classmate while the citizens of Murrieta, California, tried to stop immigrant children from entering their town?


July 22 • 4:00 PM

Can Meditation Really Slow Aging?

Is there real science in the spiritualism of meditation? Jo Marchant meets a Nobel Prize-winner who thinks so.


Follow us


Subscribe Now

How Wildlife Declines Are Leading to Slavery and Terrorism

As wildlife numbers dwindle, wildlife crimes are rising—and that's fueling a raft of heinous crimes committed against humans.

How a CEO’s Fiery Battle Speeches Can Shape Ethical Behavior

CEO war speech might inspire ethical decisions internally and unethical ones among competing companies.

Modern Technology Still Doesn’t Protect Americans From Deadly Landslides

No landslide monitoring or warning systems are being used to protect vulnerable communities.

The Link Between Carbs, Gut Microbes, and Colon Cancer

Reduced carb intake among mice protected them from colon cancer.

The New Weapon Against Disease-Spreading Insects Is Big Data

Computer models that pinpoint the likely locations of mosquitoes and tsetse flies are helping officials target vector control efforts.

The Big One

Today, the United States produces less than two percent of the clothing purchased by Americans. In 1990, it produced nearly 50 percent. July/August 2014

Copyright © 2014 by Pacific Standard and The Miller-McCune Center for Research, Media, and Public Policy. All Rights Reserved.