New ICO Surveillance Report

The UK Information Commissioner is reporting to Parliament on the state of surveillance, based on an update report on developments since 2006 authored by Surveillance Studies Network members (including me).

On Thursday 11th November, Christopher Graham, the UK Information Commissioner, sent his report on the state of surveillance and recommendations for action to the House of Commons Home Affairs Committee. His report includes the SSN-authored ‘An Update to a Report on the Surveillance Society’, on which it is based.

The update report, co-authored by Charles Raab, Kirstie Ball, Stephen Graham, David Lyon, David Murakami Wood and Clive Norris, was written in the first half of 2010. It features a review of UK surveillance since they wrote the 2006 ‘Report on the Surveillance Society’ for the Information Commissioner’s Office. The new report focuses on developments in information collection, processing and dissemination, and on the regulatory challenges posed by these surveillance developments.

The Commissioner’s overview and recommendations, and the SSN update report, can be viewed here. I’ll put something up about what I think about his recommendations later after I have had a chance to read them…

Problems with Crowdsourcing Surveillance

Bruce Schneier has a nice little piece which is saying similar things to what I’ve been saying over the last couple of years on the subject of ‘crowdsourcing’ or opening closed-circuits of surveillance. He critiques the Internet Eyes scheme and Texas Border Watch and others. This is also the subject of the paper, ‘Opening Surveillance?’ that Aaron Martin of LSE and I presented at the S&S conference in London in April, and which will hopefully be coming out in the journal’s conference special early next year…

Real-world invisibility a step closer?

Following news the other day of real-time video surveillance erasure capabilities, an even more potent way of vanishing from the eye of surveillance is being reported on by the BBC this week (although the BBC feels the add to this rather startling science story with references to a derivative but popular children’s fantasy series). For the more scientifically literate who want to avoid the drivel, you can go straight to the research paper here.

Progress is apparently being made on making more flexible ‘metamaterials’, that is materials that can bend light around them, rendering them effectively invisible. Up until recently such materials had been inflexible, but flexibility means that a wider range of applications are possible.

Anyway, it gives me a good excuse to put up another image from the fantastic Dutch artist, Desiree Palmen, who takes a rather more painstakingly old-skool approach to invisibility.

Eye See You

An interesting health story carried by the BBC today made me think, as usual, of the other possible surveillance implications. The story is about a new implant that has been developed to aid people with certain kinds of visual disorders. Effectively a digital processor deals with signals passing into the eye and communicates with the brain. This may indeed be a breakthrough for those people, but what it also made me think is how this might be adapted to turn a person into a covert ‘walking camera’: the unit is powered by a battery worn externally by the ear, and this could look like a hearing aid or a music player etc. The wireless connection required to send these internal signals elsewhere is (relatively speaking) no big deal…

This would be a step beyond (or away from) the open and visible eye-cameras employed by Eyetap’s Steve Mann or more recently Rob Spence, who lost an eye and replaced it with an eyeball camera.

America’s Surveillance State

I’ve posted several times over the last few years on how the USA is rapidly overtaking Britain as the leading democratic ‘surveillance society’. It seems like some commentators in the USA now agree – Glenn Greenwald writes on the Salon magazine site, about his essay published by the libertarian Cato Institute, and the responses it has received from different parts of the US political spectrum. It’s all worth a read, although for British activists and academics in this area in particular, it will sound like what Yogi Berra famously described as ‘deja-vu all over again’… and it’s hardly new even in the States (see the work done by ACLU, Wired’s Danger Room, experts and academics like Bill Staples, Bruce Schneier and Torin Monahan, and popular books by Christian Parenti and Robert O’Harrow, for just a couple of examples).

Cyber-Surveillance in Everyday Life: Call for Participation

Call For Participation: Cyber-Surveillance in Everyday Life

Digitally mediated surveillance (DMS) is an increasingly prevalent, but still largely invisible, aspect of daily life. As we work, play and negotiate public and private spaces, on-line and off, we produce a growing stream of personal digital data of interest to unseen others. CCTV cameras hosted by private and public actors survey and record our movements in public space, as well as in the workplace. Corporate interests track our behaviour as we navigate both social and transactional cyberspaces, data mining our digital doubles and packaging users as commodities for sale to the highest bidder. Governments continue to collect personal information on-line with unclear guidelines for retention and use, while law enforcement increasingly use internet technology to monitor not only criminals but activists and political dissidents as well, with worrisome implications for democracy.

This international workshop brings together researchers, advocates, activists and artists working on the many aspects of cyber-surveillance, particularly as it pervades and mediates social life. This workshop will appeal to those interested in the surveillance aspects of topics such as the following, especially as they raise broader themes and issues that characterize the cyber-surveillance terrain more widely:

  • social networking (practices & platforms)
  • search engines
  • behavioural advertising/targeted marketing
  • monitoring and analysis techniques (facial recognition, RFID, video analytics, data mining)
  • Internet surveillance (deep packet inspection, backbone intercepts)
  • resistance (actors, practices, technologies)

A central concern is to better understand DMS practices, making them more publicly visible and democratically accountable. To do so, we must comprehend what constitutes DMS, delineating parameters for research and analysis. We must further explore the way citizens and consumers experience, engage with and respond to digitally mediated surveillance. Finally, we must develop alliances, responses and counterstrategies to deal with the ongoing creep of digitally mediated surveillance in everyday life.

The workshop adopts a novel structure, mainly comprising a series of themed panels organized to address compelling questions arising around digitally mediated surveillance that cut across the topics listed above. Some illustrative examples:

  1. We regularly hear about ‘cyber-surveillance’, ‘cyber-security’, and ‘cyber-threats’. What constitutes cyber-surveillance, and what are the empirical and theoretical difficulties in establishing a practical understanding of cyber-surveillance? Is the enterprise of developing a definition useful, or condemned to analytic confusion?
  2. What are the motives and strategies of key DMS actors (e.g. surveillance equipment/systems/ strategy/”solutions” providers; police/law enforcement/security agencies; data aggregation brokers; digital infrastructure providers); oversight/regulatory/data protection agencies; civil society organizations, and user/citizens?
  3. What are the relationships among key DMS actors (e.g. between social networking site providers)? Between marketers (e.g. Facebook and DoubleClick)? Between digital infrastructure providers and law enforcement (e.g. lawful access)?
  4. What business models are enterprises pursuing that promote DMS in a variety of areas, including social networking, location tracking, ID’d transactions etc. What can we expect of DMS in the coming years? What new risks and opportunities are likely?
  5. What do people know about the DMS practices and risks they are exposed to in everyday life? What are people’s attitudes to these practices and risks?
  6. What are the politics of DMS; who is active? What are their primary interests, what are the possible lines of contention and prospective alliances? What are the promising intervention points and alliances that can promote a more democratically accountable surveillance?
  7. What is the relationship between DMS and privacy? Are privacy policies legitimating DMS? Is a re-evaluation of traditional information privacy principles required in light of new and emergent online practices, such as social networking and others?
  8. Do deep packet inspection and other surveillance techniques and practices of internet service providers (ISP) threaten personal privacy?
  9. How do new technical configurations promote surveillance and challenge privacy? For example, do cloud computing applications pose a greater threat to personal privacy than the client/server model? How do mobile devices and geo-location promote surveillance of individuals?
  10. How do the multiple jurisdictions of internet data storage and exchange affect the application of national/international data protection laws?
  11. What is the role of advocacy/activist movements in challenging cyber-surveillance?

In conjunction with the workshop there will be a combination of public events on the theme of cyber-surveillance in everyday life:

  • poster session, for presenting and discussing provocative ideas and works in progress
  • public lecture or debate
  • art exhibition/installation(s)

We invite 500 word abstracts of research papers, position statements, short presentations, works in progress, posters, demonstrations, installations. Each abstract should:

  • address explicitly one or more “burning questions” related to digitally-mediated surveillance in everyday life, such as those mentioned above.
  • indicate the form of intended contribution (i.e. research paper, position statement, short presentation, work in progress, poster, demonstration, installation)

The workshop will consist of about 40 participants, at least half of whom will be presenters listed on the published program. Funds will be available to support the participation of representatives of civil society organizations.

Accepted research paper authors will be invited to submit a full paper (~6000 words) for presentation and discussion in a multi-party panel session. All accepted submissions will be posted publicly. A selection of papers will be invited for revision and academic publication in a special issue of an open-access, refereed journal such as Surveillance and Society.

In order to facilitate a more holistic conversation, one that reaches beyond academia, we also invite critical position statements, short presentations, works-in-progress, interactive demonstrations, and artistic interpretations of the meaning and import of cyber-surveillance in everyday life. These will be included in the panel sessions or grouped by theme in concurrent ‘birds-of-a-feather’ sessions designed to tease out, more interactively and informally, emergent questions, problems, ideas and future directions. This BoF track is meant to be flexible and contemporary, welcoming a variety of genres.

Instructions for making submissions will be available on the workshop website by Sept 1.

See also an accompanying Call for Annotated Bibliographies, aimed at providing background materials useful to workshop participants as well as more widely.

Timeline:

2010:

Oct. 1: Abstracts (500 words) for research papers, position statements, and other ‘birds-of-a-feather’ submissions

Nov. 15: Notification to authors of accepted research papers, position statements, etc. Abstracts posted to web.

2011:

Feb. 1: Abstracts (500 words) for posters

Mar. 1: Notification to authors of accepted posters.

Apr. 1: Full research papers (5-6000 words) due, and posted to web.

May 12-15 Workshop

Sponsored by: The New Transparency – Surveillance and Social Sorting.

International Program Committee: Jeffrey Chester (Center for Digital Democracy), Roger Clarke (Australian Privacy Foundation), Gus Hosein (Privacy International, London School of Economics), Helen Nissenbaum (New York University),
Charles Raab (University of Edinburgh) and Priscilla Regan (George Mason University)

Organizing Committee: Colin Bennett, Andrew Clement, Kate Milberry & Chris Parsons.

University of Toronto & University of Victoria.

Top Secret America

Top Secret America is a really excellent project from The Washington Post with some excellent articles and classy and educative graphics. It traces the huge current US security-intelligence complex, and is partituclarly interesting for noting the massive private sector involvement. This isn’t actually entirely new – private technology companies have been intimately involved in both the manufacture and the servicing and operation of intelligence for a long time – look at the example of RCA and the early history of the National Security Association, for example. However, this blurring of the boundary between state and private sector now goes much further into the operations of intelligence. The Post alleges that “out of 854,000 people with top-secret clearances, 265,000 are contractors.” That’s almost a third. And the database of companies involved is enormous – nearly 2000. The searchable database is also going to be very helpful in our current work at the Surveillance Studies Centre on the involvment of private companies in Canadian border control!

PS: I should be back up and posting regularly now. I’ve had one of my occasional anti-blogging periods!

UofT Researchers uncover Chinese Internet espionage system

The Globe and Mail is reporting today that researchers based at the University of Toronto’s Munk Centre for International Studies, along with two private internet security consultancies, SecDev and the Shadowserver Foundation, have uncovered a worldwide network of automated intrusion programs (or botnet) based in China. The report called Shadows in the Cloud describes how over 1300 infected computers containing information related to all kinds of material from the Dalai Lama, the Indian government and US security were linked back to Chinese sources. The authors include Greg Walton who wrote the excellent early report on China’s ‘Golden Shield’ Internet surveillance and censorship system a few years ago. It can’t be said for certain that this was a Chinese state operation: as with the attacks on Estonia from Russian sources back in 2007, suspicions just as much centre on ‘patriotic hackers’, who are just doing this out of a sense of outrage at opposition to their country’s leadership. And no doubt, this is far from the only nationally-oriented botnet system.

SHADOWS IN THE CLOUD: Investigating Cyber Espionage 2.0

SSN to do new Surveillance Society report for ICO

The same team that did the influential Report on the Surveillance Society for the UK Information Commissioner’s Office (ICO) back in 2006 will be doing a follow-up report on the state of surveillance in the UK for the ICO and the national Parliament this year. Many of the things discussed in that report, which I coordinated, have been accelerating and intensifying, most obviously things like airport body-scanning and the use of drone surveillance cameras, but other things have stalled or slowed, for example the implementation of the ID card regime and more widespread use of RFID tags outside of inventory systems. We’ll be assessing the state of play and making some recommendations as a result. The project this time will be led by Professor Charles Raab in Political Science at Edinburgh University, and one of the world’s leading experts on privacy regulation, and will also include Dr Kirstie Ball of the Open University Business School, Professor Clive Norris of the Centre for Criminological Research at Sheffield, Professor Steve Graham from the Global Urban Research Unit (my old place) at Newcastle University – all in the UK – as well as myself and Professor David Lyon here at the Surveillance Studies Centre at Queen’s University, in Ontario. It will be great to be back working with the whole team again, and I hope we can contribute to a more focused debate and some real changes to UK policy and practice. We shall see…

Canadians should be concerned about camera surveillance

A new report by the Surveillance Camera Awareness Network (SCAN) at Queen’s University shows that Canadians believe surveillance cameras promote safety, but their perceptions don’t match the actual evidence. The first of its kind in Canada, A Report on Camera Surveillance in Canada will be used as background to help structure new federal surveillance legislation.

“There is little or no evidence that surveillance deters crime,” says David Lyon, coordinator of the report and director of the school’s new Surveillance Studies Centre. “Media such as TV police shows and crime stoppers promote the perception that cameras are more important than they really are.”

The report looks at the rapid growth of surveillance in Canadian society based on studies about:

  • The lack of Canadian legislation addressing public camera surveillance
  • Camera surveillance as big business
  • An exploration of camera operators
  • Research on public opinions about camera surveillance
  • Camera surveillance as one of the legacies of hosting the Olympic Games
  • Camera surveillance in Ottawa taxicabs
  • Camera surveillance in shopping malls

“The public should be concerned,” adds Professor Lyon. “Surveillance technology is constantly changing. Closed-circuit television does not accurately describe it anymore; now surveillance footage is increasingly digitized and free to flow online. What stops are in place to prevent it from falling into the wrong hands? We need to question the social ethics of surveillance footage as well as establish legal limits on how the footage can be used.”

(The Surveillance Camera Awareness Network at the Queen’s Surveillance Centre completed the report with funding from the Office of the Privacy Commissioner and the Social Sciences and Humanities Research Council of Canada. The report is the topic of a surveillance workshop on January 15 and 16, 2010 at Queen’s University).

Press Release from Queen’s University.

Contact: Jeff Drake
jeff.drake@queensu.ca
613-533-2877
Queen’s University