Law in the Internet Society

View   r5  >  r4  ...
SofiaJaramilloFirstEssay 5 - 28 Dec 2016 - Main.SofiaJaramillo
Line: 1 to 1
 
META TOPICPARENT name="FirstEssay"
Line: 12 to 12
 The traditional perception of surveillance has been associated with positive and necessary activities such as law enforcement and crime prevention, and has been targeted in scope. However, as Kevin Haggerty and Richard Ericson state, a lot has changed. According to the authors, the Orwellian and the Foucauldian panoptical models were replaced by all the contemporary surveillance mechanisms available. The model of a centralized undertaking (one/few surveilling the many) has been replaced with multiple actor including ourselves, pursuing diverse objectives. The authors call this the “surveillant assemblage” where people who were not initially the focus surveillance are now being monitored.
Changed:
<
<
It is reasonable to consider that States should use the available tools to guarantee our safety. For example, in January 2016, the Obama administration announced the creation of the Center for Global Engagement. The Center will enable and empower different groups (government and non-government organizations) to speak up against “violent extremist groups, including ISIL and al-Qaeda” and offer foreign audiences “positive alternatives”. In order to do this, “the center will offer services ranging from planning thematic social media campaigns to providing factual information that counters-disinformation to building capacity for third parties to effectively utilize social media to research and evaluation.” According to Harcourt, this is an effort to de-radicalize identified groups, by adopting the tactics learned by Google, Amazon and Netflix. They will follow these steps: using Google’s approaches, they will identify who is at risk of radicalization; then they will enhance the content of moderate intermediaries by adopting Facebook strategies (incorporate images so they get reposted for example); then take that enhanced content and feed it to the targeted individuals; and finally, they will find out whether the targets opened the content or not by using the model learned from advertisers(1).

Notes

1 : Bernard E. Harcourt presentation “Rethinking Docility in the Digital Age: A Postmortem” in the conference Docile Individuals


>
>
It is reasonable to consider that States should use the available tools to guarantee our safety. For example, in January 2016, the Obama administration announced the creation of the Center for Global Engagement. The Center will enable and empower different groups (government and non-government organizations) to speak up against “violent extremist groups, including ISIL and al-Qaeda” and offer foreign audiences “positive alternatives”. In order to do this, “the center will offer services ranging from planning thematic social media campaigns to providing factual information that counters-disinformation to building capacity for third parties to effectively utilize social media to research and evaluation.” According to Harcourt, this is an effort to de-radicalize identified groups, by adopting the tactics learned by Google, Amazon and Netflix. They will follow these steps: using Google’s approaches, they will identify who is at risk of radicalization; then they will enhance the content of moderate intermediaries by adopting Facebook strategies (incorporate images so they get reposted for example); then take that enhanced content and feed it to the targeted individuals; and finally, they will [[http://america.aljazeera.com/articles/2014/10/7/facebook-atlas.html][find out] whether the targets opened the content or not by using the model learned from advertisers(2).
 The overall purpose of the Center for Global Engagement is to counter terrorism and therefore guarantee our safety. Most of us could think it is fine for the government to do this if it ends up actually preventing crime. It is fine if the government is only doing this to meet a compelling objective. I indeed believe that there should be more information, an open and vigorous debate, a free flow of ideas. However, the ideas behind this Center sound more like brain washing undertaken by the “Thought Police” to shape human behavior.
Changed:
<
<
This “Thought Police” is not comprised of state actors only. Private actors have been using all the information they willingly receive from us, or that they buy from others, to observe our behavior, predict our needs and target us with what they need from us. Indeed, at an exponential rate, more aspects of our everyday lives are being recorded, we are leaving electronic traces of our behavior constantly because of the expansion of the “internet of things” and because we choose to conduct more aspects of our lives online. For example, online purchases, computer preferences, geographical location and movements, sleeping patterns, heart beats or even the speed in which we eat by having a fork that can trace how fast we put it to our mouths. Also, our reading habits can be recorded –remember those little icons by Facebook, Twitter and Google+ that appear on online media outlets, blogs and other websites you visit? Those icons allow these companies to track your browsing even if you don’t click on them (As long as you have an account with them and have not actively logged out, not just turned off your computer.)
>
>
This “Thought Police” is not comprised of state actors only. Private actors have been using all the information they willingly receive from us, or that they buy from others, to observe our behavior, [[http://america.aljazeera.com/articles/2014/9/15/living-with-data.html][predict] our needs and target us with what they need from us. Indeed, at an exponential rate, more aspects of our everyday lives are being recorded, we are leaving electronic traces of our behavior constantly because of the expansion of the “internet of things” and because we choose to conduct more aspects of our lives online. For example, online purchases, computer preferences, geographical location and movements, sleeping patterns, heart beats or even the speed in which we eat by having a fork that can trace how fast we put it to our mouths. Also, our reading habits can be recorded –remember those little icons by Facebook, Twitter and Google+ that appear on online media outlets, blogs and other websites you visit? Those icons allow these companies to track your browsing even if you don’t click on them (As long as you have an account with them and have not actively logged out, not just turned off your computer.)
 All these online activities allow the production of big data. The different mechanisms used by companies continue to produce separate flows of information; the increasing amount of information that we share or that is being sold, and the different actors collecting and sharing this data, lead to a comprehensiveness of the surveillance coverage. So all of this information about ourselves produces what some call our data doubles. Each person’s digital imprint that is potentially visible to a number of unknown parties, comprises data that even our closest friends, family and loved ones might not even know (3). Kevin Haggerty and Richard Ericson (2000) mentioned in the article “The Surveillant assemblage” that these doubles “rather than being accurate or inaccurate portrayals of real individuals, they are a form of pragmatics: differentiated according to how useful they are in allowing institutions to make discriminations among populations. Hence, while the surveillant assemblage is directed toward a particular cyborgesh/technology amalgamation, it is productive of a new type of individual, one comprised of pure information.” [p.614]

Notes

3 : Luise Papcke presentation “Individuality in the Age of Marketed Surveillance” in the conference Docile Individuals


Line: 38 to 38
 
Changed:
<
<
>
>

 

Revision 5r5 - 28 Dec 2016 - 21:22:31 - SofiaJaramillo
Revision 4r4 - 28 Dec 2016 - 20:18:15 - SofiaJaramillo
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM