ac596c47c148b6fd354483e6adb6dd44.ppt
- Количество слайдов: 43
Asimov's Laws of Robotics Copyright 1987 -2009 1
Human-Artefact Hybridisation (Cyborgisation) Copyright 1987 -2009 2
Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian Privacy Foundation Access and Privacy Workshop Toronto – 26 -27 October 2009 http: //www. rogerclarke. com/DV/SSF-0910 {. html, . ppt} Copyright 1987 -2009 3
Surveillance in Speculative Fiction Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian Privacy Foundation Access and Privacy Workshop Toronto – 26 -27 October 2009 http: //www. rogerclarke. com/DV/SSF-0910 {. html, . ppt} Copyright 1987 -2009 4
Surveillance in Speculative Fiction AGENDA • • Copyright 1987 -2009 Surveillance Speculative Fiction Genres Surveillance in Speculative Fiction and in Reality • Aural • Visual • Person Id, Location and Tracking • Counterveillance • Sousveillance Is Privacy Really Dead? 5
Surveillance The systematic monitoring or investigation of the actions or communications of one or more persons, directly, or through the monitoring of space or objects Personal Surveillance Focus on an identified person: because of suspicion about that individual • for activity deterrence / behaviour repression Mass Surveillance Focus on groups or spaces: • to generate suspects • for activity deterrence / behaviour repression • Copyright 1987 -2009 6
PHYSICAL Surveillance • Localised Listening, Observation • At Distance (Enhanced Listening, Observation) Sound-Amplification Devices (directional microphones) Image-Amplification Devices (field glasses, infrared binoculars, light amplifiers, satellite cameras) • Auto (i. e. by means of the Self) Devices that are attached to the person: • loosely but reliably ('mil dog-tags', mobile phone) • tightly (anklet) • implanted Copyright 1987 -2009 7
'ELECTRONIC' Surveillance 'Speech Surveillance' • Mail ‘Covers’, Telephone Interception, e. Mail Interception: • connections monitoring / traffic analysis (who is talking with whom) • communications surveillance (who is saying what to whom) 'Experience Surveillance' / 'Behaviour Surveillance' • • The Web enables surveillance of: • pages visited (to support selective advertising) • books bought • books and articles read at home or in the library Metered Road Usage; Identified Public Transport Tickets Copyright 1987 -2009 8
What were once Ephemera Observed Are Now Events Recorded and Analysed What was 'NOW OR NEVER' is now 'SOONER OR LATER' ENABLERS: • Sound-Recording • Speech-Traffic-Recording • Image-Recording • Transaction-Recording FACILITATORS: • Trail-Generation • Trail-Correlation Copyright 1987 -2009 NEW CAPABILITIES: • Retrospective Analysis • Real-Time Location • Real-Time Tracking • Anticipatory Tracking 9
Dataveillance The systematic use of personal data systems in the monitoring or investigation of the actions or communications of one or more persons Copyright 1987 -2009 10
Dataveillance The systematic use of personal data systems in the monitoring or investigation of the actions or communications of one or more persons Term first published in Commun. ACM in 1988 22, 200 / 14, 000 hits on Google in 2007 / 2009 581 / 1, 230 hits on Google Scholar in 2007 / 2009 (at least 166 / 425 of which do not contain 'Clarke') Copyright 1987 -2009 11
Categorisation of Surveillance (1) (2) (3) (4) (5) Of What? Person, Object, Space For Whom? Person, Involved Party, Third Party By Whom? Person, Involved Party, Third Party Why? Wellbeing, Evidence, Deterrence How? Physical (visual, aural, at distance, auto-surveillance); Dataveillance (retrospective, real-time, predictive); Communications / Experience; Personal / Mass Surveillance (6) (7) Copyright 1987 -2009 Where? When? Physical, Virtual, Intellectual Once, Recurrent, Scattered, Continuous 12
Genres • • Copyright 1987 -2009 Anti-Utopia / Dystopia • We (Zamyatin) Human-as-Cockroach • The Shockwave Rider (Brunner) Cyberpunk • Neuromancer (Gibson) Cyberprep 13
Anti-Utopia / Dystopia – 1 Copyright 1987 -2009 14
Anti-Utopia / Dystopia – 2 Copyright 1987 -2009 15
Copyright 1987 -2009 Human as Cockroach 16
Cyberpunk Copyright 1987 -2009 17
Aural Surveillance Copyright 1987 -2009 18
Visual Surveillance Copyright 1987 -2009 19
Identification, Location and Tracking • • • Identification (who? ) Location (where? ) Tracking (from where to where? ) • • • Copyright 1987 -2009 Retrospective Real-Time Prospective • Artefacts as Proxies • • • Motor Vehicles Mobile Phones Iris Scanning Attachments Implantation 20
Identification, Location and Tracking Vehicles as Proxies The policemen on duty have instantaneous kodaks mounted on tripods, which show the position of any vehicle at quarter-second intervals, by which it is easy to ascertain the exact speed; so there is no danger of a vehicle's speed exceeding that allowed Copyright 1987 -2009 21
Identification, Location and Tracking Vehicles as Proxies The policemen on duty have instantaneous kodaks mounted on tripods, which show the position of any vehicle at quarter-second intervals, by which it is easy to ascertain the exact speed; so there is no danger of a vehicle's speed exceeding that allowed John Jacob Astor IV Copyright 1987 -2009 22
Identification, Location and Tracking Vehicles as Proxies The policemen on duty have instantaneous kodaks mounted on tripods, which show the position of any vehicle at quarter-second intervals, by which it is easy to ascertain the exact speed; so there is no danger of a vehicle's speed exceeding that allowed John Jacob Astor IV Died on the Titanic, 1912 Copyright 1987 -2009 23
Identification, Location and Tracking Vehicles as Proxies Vehicle Id She fumbled in the storage compartment on the instrument board, apparently purposelessly. But the registration number which the traffic control automatically photographed as she left the controlway was not the number in which the car was registered Copyright 1987 -2009 24
Identification, Location and Tracking Vehicles as Proxies Vehicle Id She fumbled in the storage compartment on the instrument board, apparently purposelessly. But the registration number which the traffic control automatically photographed as she left the controlway was not the number in which the car was registered Robert Heinlein, 1941 Copyright 1987 -2009 25
Identification, Location and Tracking Vehicles as Proxies Vehicle Id She fumbled in the storage compartment on the instrument board, apparently purposelessly. But the registration number which the traffic control automatically photographed as she left the controlway was not the number in which the car was registered Robert Heinlein, 1941 ANPR Invented in 1976, Deployed in 1979 Copyright 1987 -2009 26
Iris Scanning • Copyright 1987 -2009 'Minority Report', Stephen Spielberg, Dreamworks, Released 12 June 2002 27
Iris Scanning • 'Minority Report', Stephen Spielberg, Dreamworks, Released 12 June 2002 • Abu Dhabi Illegal Immigrant scheme Deployed October 2002 http: //www. accessmylibrary. com/coms 2/summary_0286 -22721314_ITM Copyright 1987 -2009 28
Attachments for Felons (and Remandees, and. . . ) • Tattletales ". . . But if we do let you go, you must agree to carry tattletales with you at all times. Inquire of your attorney Mr. Sharp if that will be acceptable. " "What the hell is a tattletale? " Joe Schilling asked. "A tracing device, " Hawthorne said. "It will inform us where each of you are at all times" – Philip K. Dick, 1963 Copyright 1987 -2009 29
Attachments for Felons (and Remandees, and. . . ) • Tattletales ". . . But if we do let you go, you must agree to carry tattletales with you at all times. Inquire of your attorney Mr. Sharp if that will be acceptable. " "What the hell is a tattletale? " Joe Schilling asked. "A tracing device, " Hawthorne said. "It will inform us where each of you are at all times" – Philip K. Dick, 1963 • Ankle Monitors / Electronic Tagging of Humans First officially sanctioned use, in New Mexico, 1983 Copyright 1987 -2009 30
Human Implantation • • Radiant – a substance injected into the shoulder, providing positioning, information – Jack Vance, 1954 The Ring – 'A surgically implanted electronic monitor that caused agony when a convict strayed. . . ' – Piers Anthony and Robert Margroff, 1968 Skull Bug – Electronic device implanted in the cranium at birth, for monitoring and control – Alfred Bester, 1974 Copyright 1987 -2009 31
Human Implantation • • • Radiant – a substance injected into the shoulder, providing positioning, information – Jack Vance, 1954 The Ring – 'A surgically implanted electronic monitor that caused agony when a convict strayed. . . ' – Piers Anthony and Robert Margroff, 1968 Skull Bug – Electronic device implanted in the cranium at birth, for monitoring and control – Alfred Bester, 1974 Resistance from a journal editor about the idea – 1992 Copyright 1987 -2009 32
Human Implantation • • Radiant – a substance injected into the shoulder, providing positioning, information – Jack Vance, 1954 The Ring – 'A surgically implanted electronic monitor that caused agony when a convict strayed. . . ' – Piers Anthony and Robert Margroff, 1968 Skull Bug – Electronic device implanted in the cranium at birth, for monitoring and control – Alfred Bester, 1974 Resistance from a journal editor about the idea – 1992 First chip implantation in animals – 1991 Copyright 1987 -2009 33
Human Implantation • First voluntary chip implantation in humans – 1998 Copyright 1987 -2009 34
Human Implantation • • • Radiant – a substance injected into the shoulder, providing positioning, information – Jack Vance, 1954 The Ring – 'A surgically implanted electronic monitor that caused agony when a convict strayed. . . ' – Piers Anthony and Robert Margroff, 1968 Skull Bug – Electronic device implanted in the cranium at birth, for monitoring and control – Alfred Bester, 1974 Resistance from a journal editor about the idea – 1992 First chip implantation in animals – 1991 First voluntary chip implantation in humans – 1998 First imposed chip implantation in humans – 2000? 2004? Copyright 1987 -2009 35
Countersurveillance • • • Spoofing of Traffic-Monitoring Camera – ". . . the registration number which the traffic control automatically photographed as she left the controlway was not the number in which the car was registered" – Robert Heinlein, 1941 Spy-Proof Office – montors received a conversation constructed at random out of a vast stock of innocuous phrases in various tone and voices. And undetectably so' – Isaac Asimov, 1951 Radiant Shield – A pad of woven metal around the shoulder and chest – Jack Vance, 1954 Probe Screen Hood – A device that blocks attempts to see into the contents of the brain mind – Philip K. Dick, 1955 Eavesdropper – an object that will detect if a is microphone is close enough to pick up conversation – James Blish, 1957 Copyright 1987 -2009 36
Sousveillance • • • Copyright 1987 -2009 The Unsleeping Eye – substituted for a human eye D. G. Compton, 1973, filmed as La mort en direct, 1980 Wearcam – Steve Mann, c. 1980 True-Vu Lenses – 'Oldsters used electronic sun hats and True-Vu goggles to surveil young people and any other trouble makers. The goggles would record whatever the wearer was watching, and then upload it to a secure location (in case anything happened)' – David Brin, 1990 Sousveillance – Steven Mann, coined c. 1995 for the use of optic technologies to observe those in authority Alibi Archive – A recording of transmissions from a personal implant, storing everything that happened to that individual – Robert J. Sawyer, 2003 37
The Blurring of Speculative Fiction and Reality Copyright 1987 -2009 38
Interpretations • You have zero privacy anyway, get over it • Privacy is for people with something to hide • Privacy through secrecy is dead • Newgens have a completely different approach • Privacy is bruised but unbowed • Privacy is essential for humanity to survive Copyright 1987 -2009 39
Surveillance in Speculative Fiction AGENDA • • Copyright 1987 -2009 Surveillance Speculative Fiction Genres Surveillance in Speculative Fiction and in Reality • Aural • Visual • Person Id, Location and Tracking • Counterveillance • Sousveillance Is Privacy Really Dead? 40
Conclusions • • Surveillance offers fiction-writers a lot of scope Authors' imaginations have mostly run only a few, short decades ahead of technology Copyright 1987 -2009 41
Conclusions • • Surveillance offers fiction-writers a lot of scope Authors' imaginations have mostly run only a few, short decades ahead of technology Surveillance is increasing privacy concerns Active opposition is imminent, as surveillance goes beyond the levels of acceptability Copyright 1987 -2009 42
Conclusions • • • Surveillance offers fiction-writers a lot of scope Authors' imaginations have mostly run only a few, short decades ahead of technology Surveillance is increasing privacy concerns Active opposition is imminent, as surveillance goes beyond the levels of acceptability 'We must teach our technologies to forget' Maybe we must also teach our technologies to forego data collection, except with consent or where reasonable grounds for suspicion exist Copyright 1987 -2009 43
ac596c47c148b6fd354483e6adb6dd44.ppt