Menus Subscribe Search

Follow us


The World Wide Web

online-surveillance

(Photo: Maksim Kabakou/Shutterstock)

Do You Own Your Identity Online?

• April 04, 2014 • 10:00 AM

(Photo: Maksim Kabakou/Shutterstock)

The European “right to be forgotten” could help protect U.S. citizens against blanket data surveillance.

Facebook announced late last month that it had made a leap forward in its ability to identify faces in the photos published on its platform. Their software could match the same face in two different pictures with an accuracy of 97.25 percent, “closely approaching human-level performance,” according to the company’s report. The human rate of accuracy when identifying faces is 97.53 percent, just a few tenths better than Facebook’s algorithm.

This means that if the social network’s database has your face connected to your name—and, with more than 1.3 billion users and over 250 billion photos as of last year, it likely does—it can scan friends’ photos and tag you. On the surface, the system is routine and convenient: No longer do users have to manually input names when uploading a new photo. But does it strike anyone as strange that Facebook is trumpeting its ability to dissect your photos, as if a security guard is carefully scanning each party pic you post for readable data?

In the Internet era, our personal identities are fractured into many parts. We can be identified by our social media accounts or our phone calls and Web browsing histories, as Edward Snowden’s National Security Agency leaks underlined. And then there are the less mutable aspects of our identities: We can be tracked by the appearance of our faces, as on Facebook. As technology improves, we should be thinking about how surveillance can be applied to these latter qualities as well as the former.

Perhaps our primary concern should not be the collection of data, but how and why it is accessed and how long it survives.

As mundane as that assertion sounds, surveillance of physical data is becoming increasingly important, and not just for providing CSI plot points. Our data—whether physical or virtual, or physical and virtual—identifies us as individuals and is inextricable from our daily lives. Yet even in this time of mass surveillance, the legal structures around how we control our identities are more vague than ever.

The NSA’s own surveillance programs do have certain legal checks in place to protect those whose data it collects. The problem is, those confidential boundaries have never been examined under public scrutiny.

With surveillance programs like PRISM, the agency doesn’t need warrants to collect the data (including browsing history and phone call metadata) of U.S. citizens because it’s too difficult, it was determined, to gather massive amounts of information while filtering out targets from a specific region. Leaked documents (via ProPublica) call this the “limitations on NSA’s ability to filter communications.” If the data the NSA gathers turns out to be from a domestic U.S. citizen and doesn’t contain relevant information, it must be destroyed “at the earliest practicable point in the processing cycle,” though the domestic communications can still be retained for up to five years.

In the past, the Supreme Court has ruled such mass collections unconstitutional, but the U.S. laws governing data collection and surveillance have been loosening over the past decade, as this timeline clearly shows. A legal initiative in Europe, however, would have slowed the PRISM program down and given individuals more control over their data.

The “right to oblivion” (le droit à l’oubli) or “right to be forgotten” is a privacy measure put in place by the European Commission that allows Internet users to choose which of their data survives online. It has been defined as “the right of any individual to see himself or herself represented in a way that is not inconsistent with his/her current personal and social identity.” The law asserts an individual’s right to their online persona: If you tell Facebook to remove certain unflattering photos that you uploaded, the company is legally obligated to delete them.

In Italy, the first landmark right-to-oblivion ruling in 2012 established a precedent to an individual’s right over online information. A well-known figure who had been arrested for a crime sued a major newspaper to take down stories that failed to report their eventual acquittal. After an appeal, the court found that the newspaper had to “devise a suitable method to provide … an update to the original news,” according to Lexology.

Other cases underline the difficulty of managing online information. A Spanish camping company sued Google Spain because the search engine displayed gruesome images from a gas explosion that had occurred near the campground (the company was not at fault). The company argued that the images were damaging their business, but the case was dismissed on the grounds that as a subsidiary, Google Spain wasn’t liable to be sued. Google faces other cases from individuals requesting the removal of personal data, which is more specifically targeted by the law, rather than business information.

The right-to-oblivion law has been accused of overreach by the Stanford Law Review. It encourages micro-management of online identity and allows abusers of the law to forcibly remove any information they might find simply embarrassing or unflattering from the Internet, as opposed to information that represents an actual overreach by journalists, businesses, or the government. Yet in the context of the NSA, this kind of law could enforce the ephemerality of sensitive data used in identity surveillance and allow individuals to manage the persistence of personal information.

Perhaps our primary concern should not be the collection of data, but how and why it is accessed and how long it survives. The NSA documents show an enforceable length of time that collected information can be held (whether that is followed or not is another question), but private companies and other areas of the government lack the same strict guidelines. Future regulation must cover both the kinds of data that can be gathered and if they can be stored.

The issue of data collection is particularly relevant in the case of Facebook. When the website suggests that you be tagged in a photo, what it actually does is compare a pre-created quantified dataset of your face to the newly uploaded image and measures how closely you match the identifiable subjects. Facebook keeps individual face templates in its databases to use over and over again.

Yet that template, if requisitioned by a group like the NSA, can be used in other contexts to identify an individual; in security camera footage, for example. Though it offers its users a chance to opt-out, Facebook is creating a database of identifiable faces en masse, and is already using them to improve its identification technology.

There is no legal ruling about the protection of face identification in the U.S., but there are other cases that could provide recourse if Facebook’s data were to be unreasonably used to identify a criminal by face recognition, for example. What most closely resembles mass face-data gathering are DNA dragnets, the widespread collection of DNA data to solve crimes like rape. Often, police will collect DNA samples from an entire population—the town the crime took place in, for example. But are they allowed to keep the samples to compare against in future cases?

A 2013 Supreme Court ruling found that DNA evidence can legally be collected from someone who has been arrested in connection with a serious crime, suggesting that even those mistakenly arrested or who are not ultimately found guilty are liable to be entered into a DNA database. Other cases reinforce the ephemerality of passively collected identity data.

In 1995, Michigan resident Blair Shelton was pressured into giving a genetic sample in connection with a rape case. When the testing freed him of suspicion, Shelton successfully sued to have his DNA information destroyed. The Michigan Supreme Court finally ruled, “state law says that police cannot keep DNA records of innocent people.” That edict should also apply to digital records.

How data is kept is just as important, if not more, than how it’s collected—a lesson we can take from these examples and apply to blanket NSA identity surveillance. While opting-out is currently an option on Facebook, it’s certainly not for government agencies.

The utopian promise of the Internet is that it’s a free hub for information, where the more data you give away the more benefit you receive in the form of discounts, targeted ads, or community membership. But rather than giving away information wantonly and waiting for legal structures to come into place, the question in the coming years should be how can we can control our identities more, not less. Laws like the right to be forgotten should provide tools to assert this control.

Kyle Chayka
Kyle Chayka is a freelance technology and culture writer living in Brooklyn. Follow him on Twitter @chaykak.

More From Kyle Chayka

A weekly roundup of the best of Pacific Standard and PSmag.com, delivered straight to your inbox.

Recent Posts

September 30 • 4:00 AM

Grad School’s Mental Health Problem

Navigating the emotional stress of doctoral programs in a down market.


September 29 • 1:21 PM

Conference Call: Free Will Conference


September 29 • 12:00 PM

How Copyright Law Protects Art From Criticism

A case for allowing the copyright on Gone With the Wind to expire.


September 29 • 10:00 AM

Should We Be Told Who Funds Political Attack Ads?

On the value of campaign finance disclosure.


September 29 • 8:00 AM

Searching for a Man Named Penis

A quest to track down a real Penis proves difficult.


September 29 • 6:00 AM

Why Do So Many People Watch HGTV?

The same reason so many people watch NCIS or Law and Order: It’s all a procedural.


September 29 • 4:00 AM

The Link Between Depression and Terrorism

A new study from the United Kingdom finds a connection between depression and radicalization.


September 26 • 4:00 PM

Fast Track to a Spill?

Oil pipeline projects across America are speeding forward without environmental review.


September 26 • 2:00 PM

Why Liberals Love the Disease Theory of Addiction, by a Liberal Who Hates It

The disease model is convenient to liberals because it spares them having to say negative things about poor communities. But this conception of addiction harms the very people we wish to help.


September 26 • 1:21 PM

Race, Trust, and Split-Second Judgments


September 26 • 9:47 AM

Dopamine Might Be Behind Impulsive Behavior

A monkey study suggests the brain chemical makes what’s new and different more attractive.


September 26 • 8:00 AM

A Letter Becomes a Book Becomes a Play

Sarah Ruhl’s Dear Elizabeth: A Play in Letters From Elizabeth Bishop to Robert Lowell and Back Again takes 900 pages of correspondence between the two poets and turns them into an on-stage performance.


September 26 • 7:00 AM

Sonic Hedgehog, DICER, and the Problem With Naming Genes

Wait, why is there a Pokemon gene?


September 26 • 6:00 AM

Sounds Like the Blues

At a music-licensing firm, any situation can become nostalgic, romantic, or adventurous, given the right background sounds.


September 26 • 5:00 AM

The Dark Side of Empathy

New research finds the much-lauded feeling of identification with another person’s emotions can lead to unwarranted aggressive behavior.



September 25 • 4:00 PM

Forging a New Path: Working to Build the Perfect Wildlife Corridor

When it comes to designing wildlife corridors, our most brilliant analytical minds are still no match for Mother Nature. But we’re getting there.


September 25 • 2:00 PM

Fashion as a Inescapable Institution

Like it or not, fashion is an institution because we can no longer feasibly make our own clothes.


September 25 • 12:00 PM

The Fake Birth Mothers Who Bilk Couples Out of Their Cash by Promising Future Babies

Another group that’s especially vulnerable to scams and fraud is that made up of those who are desperate to adopt a child.


September 25 • 10:03 AM

The Way We QuickType


September 25 • 10:00 AM

There’s a Name for Why You Feel Obligated to Upgrade All of Your Furniture to Match

And it’s called the Diderot effect.


September 25 • 9:19 AM

School Counselors Do More Than You’d Think

Adding just one counselor to a school has an enormous impact on discipline and test scores, according to a new study.


September 25 • 9:05 AM

Sponsors: Coming to a Sports Jersey Near You

And really, it’s not that big of a deal.


September 25 • 8:00 AM

The Most Pointless Ferry in Maryland

Most of the some 200 ferries that operate in the United States serve a specific, essential purpose—but not the one that runs across the Tred Avon River.


September 25 • 7:00 AM

Hating Happiness

People all over the world are afraid of happiness, and that’s not necessarily a bad thing. It’s yet another challenge to the notion that positive thinking can heal all wounds.


Follow us


Dopamine Might Be Behind Impulsive Behavior

A monkey study suggests the brain chemical makes what's new and different more attractive.

School Counselors Do More Than You’d Think

Adding just one counselor to a school has an enormous impact on discipline and test scores, according to a new study.

How a Second Language Trains Your Brain for Math

Second languages strengthen the brain's executive control circuits, with benefits beyond words.

Would You Rather Go Blind or Lose Your Mind?

Americans consistently fear blindness, but how they compare it to other ailments varies across racial lines.

On the Hunt for Fake Facebook Likes

A new study finds ways to uncover Facebook Like farms.

The Big One

One company, Amazon, controls 67 percent of the e-book market in the United States—down from 90 percent five years ago. September/October 2014 new-big-one-5

Copyright © 2014 by Pacific Standard and The Miller-McCune Center for Research, Media, and Public Policy. All Rights Reserved.