We all know that we are under CCTV surveillance on many occasions each day, particularly when we are in public places. For the most part we accept that being – or potentially being – watched in public places is a reasonable price to pay for the security that 24-hour surveillance offers. However, we also have expectations about what is done with CCTV footage, when, and by whom. A recent discussion with a friend threw up some interesting questions about the nature of these expectations and their reasonableness.
My friend works in a bar where, unsurprisingly, there are several CCTV cameras. Everyone knows where these cameras are and that they are permanently in operation – there is not supposed to be any secrecy. Whilst the primary purpose of the cameras is to promote security, a member of the management team has begun to use them in a way that could be seen as ethically problematic: she logs on to view the footage in real-time, remotely, at her home. In addition to watching the footage, the manager has also addressed points of staff discipline based on what she sees. Perhaps particularly troubling is that she has commented on the way a member of staff behaved when no one was around – when the member of staff thought that she was ‘alone’. Continue reading
New York City contemplates using aerial drones for surveillance purposes, while North Korea buys thousands of cameras to spy on its impoverished population. Britain has so many cameras they cease being newsworthy. The stories multiply – it is trivial to note we are moving towards a surveillance society.
In an earlier post, I suggested surrendering on surveillance might be the least bad option – of all likely civil liberty encroachments, this seemed the less damaging and hardest to resist. But that’s an overly defensive way of phrasing it – if ubiquitous surveillance and lack of privacy are the trends of the future, we shouldn’t just begrudgingly accept them, but demand that society gets the most possible out of them. In this post, I’m not going to suggest how to achieve enlightened surveillance (a 360 degree surveillance would be a small start, for instance), but just outline some of the positive good we could get from it. We all know the negatives; but what good could come from corporations, governments and neighbours being able to peer continually into your bedroom (and efficiently process that data)? In the ideal case, how could we make it work for us? Continue reading
On July 1 professor Steve Mann from University of Toronto got into an altercation at a Paris McDonald’s, apparently because employees objected to his camera glasses. McDonald’s denies any wrongdoing, while professor Mann has posted his account online – complete with footage from his glasses. The event has caused a great deal of interest, with some calling it the world’s first cybernetic hate crime. Exactly what happened and why is unclear and does not concern this post. Whether it was a cybernetic hate crime, rules-obsessed employees or a clash of personality and culture is fairly irrelevant. What is interesting is the ethics of documenting one’s environment, and how to deal with disparities in documentary power.
Cory Doctorow makes a simple but important point in the Guardian: censorship today is inseparable from surveillance. In modern media preventing people from seeing proscribed information requires systems that monitor their activity. To implement copyright-protecting censorship in the UK systems must be in place to track where people seek to access and compare it to a denial list, in whatever medium is used.
The smith was working hard on making a new tool. A passer-by looked at his work and remarked that it looked sharp and dangerous. The smith nodded: it needed to be very sharp to do its work. The visitor wondered why there was no cross-guard to prevent the user’s hand to slide onto the blade, and why the design made it easy to accidentally grip the blade instead of the grip. The smith explained that the tool was intended for people who said they knew how to use it well. “But what if they were overconfident, sold it to somebody else, or had a bad day? Surely some safety measures would be useful?” “No”, said the smith, “my customers did not ask for them. I could make them with a slight effort, but why bother?”
Would we say the smith was doing his job in an ethical manner?
Here are two other pieces of news: Oxford City Council has decided to make it mandatory for taxicabs in Oxford to have CCTV cameras and microphones recording conversations of the passengers. As expected, many people are outraged. The stated reason is to improve public safety, although the data supporting this decision doesn’t seem to be available. The surveillance footage will supposedly not be made available other than as evidence for crimes, and not stored for more than 28 days. Meanwhile in the US, there are hearings about the Stop Online Piracy Act (SOPA) and the PROTECT IP Act, laws intended to make it easier to block copyright infringement and counterfeiting. Besides concerns that critics and industries most affected by the laws are not getting access to the hearings, a serious set of concerns is that they would make it easy to censor websites and block business on fairly loose grounds, with few safeguards against false accusations (something that occurs regularly), little oversight, few remedies for the website, plus the fact that a domestic US law would apply internationally due to the peculiarities of the Internet and US legal definitions.
In the last ten years ICTs (information and communication technologies) have been increasingly used by militaries both to develop new weapons and to improve communication and propaganda campaigns. So much so that military often refers to ‘information’ as the fifth dimension of warfare in addition to land, sea, air and space. Given this scenario does not surprise that the Pentagon would invest part of its resources to develop a new program called Social Media in Strategic Communication (SMISC) allegedly to ‘to get better at both detecting and conducting propaganda campaigns on social media’ as reported a few days ago on Wired (http://www.wired.com/dangerroom/2011/07/darpa-wants-social-media-sensor-for-propaganda-ops/on ).
The program has two main functions, it will support the military in their propaganda and it will allows for identifying the “formation, development and spread of ideas and concepts (memes)” in social groups. Namely, the program will be able to spot on the web rumours or emerging themes, figure out whether such themes are randomly coming up or are the results of a propaganda operation by ‘adversary’ individuals or group. To any one even also slightly concerned with ethical problems all this rings more than one bell.
SMISC is one more surveillance tool empowered by ICTs. We all know that the information that we put on the web, on social networks or on websites, even our queries on search engines, is mined and analysed for second purposes. But it becomes more scaring when the analysis is done by government agencies, as in this case the Internet becomes a tool for surveillance. A surveillance, which may go far behind the one we may be already accustomed to. The unexpected turn is that the Internet, which has been for long time considered a ‘democratic place’, where anyone could express his/her thoughts and act more or less freely, could become the next Panopticon and provide the tool for monitoring both a wide range of information, from the newspaper one reads in the morning to one’s political commitment, and a vast amount of people, virtually all the web users.
This can have serious consequences. Consider the case of the recent riots and revolutions in middle East. In most cases, the Internet was the media through which people could talk about the political situation of their countries, organise protests and also describe their conditions to other people all over the world. What would have happened if middle East government could have spot the protest movements in their early days? Until now, governments, like the Egyptian one, have shut down the web in their countries to limit the circulation of information about what was happening; but the development of SMISC shows that there is a further step that could be soon taken, that is the proactive use of the Internet by governments for surveillance purposes. In this case, as the technologies for data mining evolves, the Internet may represent the most powerful surveillance/intelligence tool developed so far. If so, it seems that it is time to start worry about the rights of the Internet users and to find out ways of protecting them.