And the data tell two stories.
One of the most disorienting aspects of the attack by extremist Trump supporters at the U.S. Capitol last month was the fact that so many people felt comfortable rioting without covering their faces. |
They should, of course, have been wearing masks to protect themselves and others from the coronavirus. But that aside, many in the mob seemed content to commit crimes in full view of thousands of television, security and cellphone cameras. Some people livestreamed themselves. Many took selfies. |
Look, Ma, I'm breaking the law! |
With the president behind them, perhaps they felt that the law didn't apply. |
That's all come crashing down. Federal agents, security researchers, internet sleuths, journalists and average Americans have pored over the footage and identified many faces in the crowd. Rioters have been named, arrested, fired, shamed in public. |
While it was no secret that cameras were documenting the attack, another type of technology was also keeping a close watch — and making a detailed record — of the people who walked from the National Mall, where the president gave his speech, to the halls of the Capitol building. This location data, consisting of millions of pings — a record of the location of a given smartphone at a given time — was being dutifully collected by companies that specialize in such things. |
The data is supposed to be anonymous. But, as past reporting from Times Opinion has demonstrated, it's ludicrous to describe it this way. The movement history of each smartphone is as unique as a fingerprint. In the case of the riot, the smartphones they carried could be traced from the Capitol back to the owner's home in many instances. |
That's why it was so easy for my colleagues Charlie Warzel and Stuart Thompson to match smartphones with their owners, after a source shared a leaked data set containing millions of pings from Jan. 6. |
The availability of this data raises its own set of questions. The source was outraged by the attack on the Capitol but also outraged that the tracking technology is now as pervasive as it is unregulated. What today could be used to identify insurrectionists could just as easily be turned against peaceful demonstrators and other innocent Americans. |
"What if instead of going to you, I wanted to publish it myself?" the source told Charlie and Stuart. "What if I were vengeful? There's nothing preventing me from doing that. It's totally available. If I had different motives, all it would take is a few clicks, and everyone could see it." |
In the aftermath of the attack, it's worth considering the technological tools that made it possible to organize the riot, as well as the tools that made it possible to bring the rioters to justice and how they could be used in the future — for good or for ill. |
Here's what we're focusing on today: |
Forward this newsletter to friends … |
Contact Us If you have questions about your Times account, delivery problems or other issues, visit our Help Page or contact The Times. |
|
No comments:
Post a Comment