Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
Next revisionBoth sides next revision
masssurveillance [2014/01/14 10:03] – created anonymousmasssurveillance [2014/01/14 10:09] – footnote syntax anonymous
Line 3: Line 3:
   * Noone knows how the world will look like in 20 years time - laws could get changed or even become irrelevant. The main danger here is the creation of a surveillance state. Sadly the majority of people doesn't understand that HISTORY CONTINUES and still think they're protected by "law&order" in their safe and static world.   * Noone knows how the world will look like in 20 years time - laws could get changed or even become irrelevant. The main danger here is the creation of a surveillance state. Sadly the majority of people doesn't understand that HISTORY CONTINUES and still think they're protected by "law&order" in their safe and static world.
  
-  * One could use the data for rating people by threat-potential using AI that analyse the data. (Note that machines don't "understand" context (or for example irony) as humans do nor is such usually unambiguous). Being rated high can have very real consequences such as personalized extended surveillance, being denied access to various parts of society, random searches etc. For instance the German sociologist Andrej Holm was subject to months of personalized surveillance (having people listen directly to all his phone calls etc) and conviction because he googled terms ("gentrification") that previously occurred in a letter of a terrorist organization **[1]**. The ADVISE project **[2]** seems to be an attempt of implementing this.+  * One could use the data for rating people by threat-potential using AI that analyse the data. (Note that machines don't "understand" context (or for example irony) as humans do nor is such usually unambiguous). Being rated high can have very real consequences such as personalized extended surveillance, being denied access to various parts of society, random searches etc. For instance the German sociologist Andrej Holm was subject to months of personalized surveillance (having people listen directly to all his phone calls etc) and conviction because he googled terms ("gentrification") that previously occurred in a letter of a terrorist organization ((https://de.wikipedia.org/wiki/Andrej_Holm#Ermittlungsverfahren_wegen_Verdachts_der_Mitgliedschaft_in_einer_terroristischen_Vereinigung)) **[1]**. The ADVISE project **[2]** seems to be an attempt of implementing this.
  
   * One of the most important problems (that is especially emerging from the one above) is the constraint of people's decisions that inevitable follows if they know they're being watched or susceptible to being watched and their actions being recorded. This breeds conformity, adhering to norms and constrains the freedom people ought to have by privacy **[3]**. (Also note that the gradual establishment of adhering to specific informal norms makes those norms prone to becoming formal laws. Especially as the eavesdroppers feel their enormous power "Power corrupts; absolute power corrupts absolutely".)   * One of the most important problems (that is especially emerging from the one above) is the constraint of people's decisions that inevitable follows if they know they're being watched or susceptible to being watched and their actions being recorded. This breeds conformity, adhering to norms and constrains the freedom people ought to have by privacy **[3]**. (Also note that the gradual establishment of adhering to specific informal norms makes those norms prone to becoming formal laws. Especially as the eavesdroppers feel their enormous power "Power corrupts; absolute power corrupts absolutely".)
Line 22: Line 22:
 ---- ----
  
-[1] https://de.wikipedia.org/wiki/Andrej_Holm#Ermittlungsverfahren_wegen_Verdachts_der_Mitgliedschaft_in_einer_terroristischen_Vereinigung +[1]  \\ 
-[2] https://en.wikipedia.org/wiki/ADVISE +[2] https://en.wikipedia.org/wiki/ADVISE \\ 
-[3] https://en.wikipedia.org/wiki/Observer_effect +[3] https://en.wikipedia.org/wiki/Observer_effect \\ 
-[4] https://en.wikipedia.org/wiki/National_Security_Agency +[4] https://en.wikipedia.org/wiki/National_Security_Agency \\ 
-[5] https://en.wikipedia.org/wiki/Booz_Allen_Hamilton#PRISM_media_disclosures +[5] https://en.wikipedia.org/wiki/Booz_Allen_Hamilton#PRISM_media_disclosures \\ 
-[6] http://www.telegraph.co.uk/news/worldnews/northamerica/usa/10263880/NSA-employees-spied-on-their-lovers-using-eavesdropping-programme.html +[6] http://www.telegraph.co.uk/news/worldnews/northamerica/usa/10263880/NSA-employees-spied-on-their-lovers-using-eavesdropping-programme.html \\ 
-[7] https://youtu.be/4x__looLj9c?t=55s +[7] https://youtu.be/4x__looLj9c?t=55s \\ 
-[8] http://www.reuters.com/article/2013/11/01/us-uk-nsa-idUSBRE9A013O20131101 +[8] http://www.reuters.com/article/2013/11/01/us-uk-nsa-idUSBRE9A013O20131101 \\ 
-[9] http://www.theguardian.com/world/2013/sep/09/nsa-spying-brazil-oil-petrobras & http://www.huffingtonpost.com/john-glaser/america-as-economic-spy-n_b_4190948.html & http://g1.globo.com/fantastico/noticia/2013/09/nsa-documents-show-united-states-spied-brazilian-oil-giant.html +[9] http://www.theguardian.com/world/2013/sep/09/nsa-spying-brazil-oil-petrobras & http://www.huffingtonpost.com/john-glaser/america-as-economic-spy-n_b_4190948.html & http://g1.globo.com/fantastico/noticia/2013/09/nsa-documents-show-united-states-spied-brazilian-oil-giant.html \\ 
-[10] http://www.techdirt.com/articles/20130909/04383424450/latest-leak-shows-nsa-engaging-economic-espionage-not-fighting-terrorism.shtml & https://en.wikipedia.org/wiki/Industrial_espionage#Information_theft_and_sabotage +[10] http://www.techdirt.com/articles/20130909/04383424450/latest-leak-shows-nsa-engaging-economic-espionage-not-fighting-terrorism.shtml & https://en.wikipedia.org/wiki/Industrial_espionage#Information_theft_and_sabotage \\ 
-[11] http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security +[11] http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security \\ 
-[12] https://en.wikipedia.org/wiki/Main_Core +[12] https://en.wikipedia.org/wiki/Main_Core \\ 
-[13] http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data +[13] http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data \\ 
-[14] http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html +[14] http://www.huffingtonpost.com/2013/11/26/nsa-porn-muslims_n_4346128.html \\ 
-[15] "These Programs Were Never About Terrorism: They’re About Economic Spying, Social Control, and Diplomatic Manipulation. They’re About Power" ~Snowden in letter to the people of brazil: http://www1.folha.uol.com.br/internacional/en/world/2013/12/1386296-an-open-letter-to-the-people-of-brazil.shtml+[15] "These Programs Were Never About Terrorism: They’re About Economic Spying, Social Control, and Diplomatic Manipulation. They’re About Power" ~Snowden in letter to the people of brazil: http://www1.folha.uol.com.br/internacional/en/world/2013/12/1386296-an-open-letter-to-the-people-of-brazil.shtml \\