[widdershins] Turning the tables on Big Brother?
Gmx Private 01
gegohouse at gmx.at
Tue Oct 12 08:44:32 EDT 2004
Turning the tables on Big Brother?
John Horvath 19.07.2004
Is it possible to use technology to counter the erosion of privacy in
our post 9/11 world?
Before 9/11, many were already worried about the potential of computers
and the Internet to erode personal privacy. That's still an issue, but
new state powers of surveillance to combat so-called "terrorism" at
home have now made matters a lot worse. The events of September 2001
made the tilt in the balance between security and personal privacy more
visible.
These new attitudes are especially noticeable in the US, where privacy
traditionally takes second place to freedom of commerce. However,
within Europe member states of the European Union (EU) have also
strengthened their defenses through collecting and sharing more
personal information. Thus, greater snooping powers for the state have
added to concerns about the erosion of privacy, many of which
previously related to the private sector alone.
Take, for example, America's proposed CAPPS II, a law which represents
a scary example of the extent to which a government seeks control.
According to this law, all airline passengers would be screened and
their records would be checked against the FBI's NCIC (National Crime
Information Center) database -- which, ironically, is exempt from
requirements to ensure that its contents are accurate.
While we may bemoan the relative security and freedom we felt prior to
the advent of the Third Millennium, it must be kept in mind that
concern about computers and privacy is not new. Large scale government
data collection first became possible in the 1970s. State surveillance
to counter terrorism is not new, either. The events of September 2001
may have strengthened government mandates to use intrusive security
measures that citizens previously might not have tolerated, but many of
these seemingly "new measures" had previously been under discussion.
Unfortunately, democracy is in decline in most parts of the western
world; hence, the ability to undo the mess that politicians have made
is severely restricted. Since it's no longer possible to change the
system by simple political means, some have been looking to technology
as a way to help and restore the balance that it, ironically, had
disturbed in the first place. Along these lines, what has been proposed
is to use technology in such a way that unites security with privacy.
There are three main areas in which technology can be used to this
extent. The first is what is known as "identity-related technologies".
These are tools that help to identify ourselves in much the same way as
passports and driving licenses validate us in the physical world.
Central to this is the concept of Identity Management Systems (IMSs),
which can be either under the user's direct control (on a PC or a
mobile phone, for example) or based in a centralised location.
Identification technologies include virtual identification processes,
such as passwords and digital signatures, as well as physical tags like
iris recognition, fingerprints, and even surgically implanted chips.
The second type of identity technology is known as "location-based
services". These relate mainly to the ability of mobile phones to
identify the geographical movements of their users, though radio tags
and satellite navigation systems will also play a part. Emergency
services as well as concerned parents are already using this
technology, and tracking accuracy is continually improving.
Finally, the third area, "ambient intelligence space", refers to the
ability of tomorrow's networked and sensor-laden environments to
identify, track, and respond to individual people. Smart homes and
offices, for instance, could control computer displays and open doors
for people who have been identified and authorised through radio tags
or surveillance cameras.
Although these three areas seem to provide an alternative to the brute
security measures now in place throughout the US and the EU, they are
by no means foolproof and, in the final analysis, do little to redress
the privacy concerns of individuals. Identity-related technologies have
already been implemented in many areas; their main weakness is in the
structure of centralised systems, for such systems are open to abuse.
Moreover, IMSs actually differ little from what is already being done
in the US and the EU through existing centralised databases. There is
little or no transparency on how the stored information is handled, and
to whom and when it is shared.
As for location-based services, tracking accuracy constantly improves
along with nefarious uses of the technology. Furthermore, a line is
blurred between the notion of "tracking" and control. If the wish of
some diehard enthusiasts of the technology is ever realised -- that is,
we shall all have surgically implanted chips to track our movements
starting from childhood (under the guise of child protection) -- this
will no doubt exceed the bounds of present surveillance systems in
place within both the US and the EU.
Lastly, ambient intelligence spaces do little to help and restore a
sense of privacy. As spaces become increasingly networked, there is a
loss of distinction between what can be defined as a public space and a
private area. Hence, the resulting blurring of the boundaries between
personal and public spaces would require careful legal and technical
control; however, given the present obsession with fighting terrorism
at home and abroad, such a balance is highly unlikely to be achieved.
In the end, Big Brother has little to worry about as the technology to
help restore a sense of privacy is unlikely to redress the balance that
had been lost over the past few years. New technologies can improve the
quality of life, but they are not foolproof. Computerised systems are
only as reliable as the people who run them. Even the tightest security
controls may be undermined through social engineering or human
negligence. One just has to look at the enigma of spam and the plague
of computer viruses to see how fallible such technologies really are.
Links
Telepolis Artikel-URL:
http://www.telepolis.de/english/inhalt/te/17893/1.html
--------------------
Copyright © 1996-2004. All Rights Reserved. Alle Rechte vorbehalten
Heise Zeitschriften Verlag, Hannover
More information about the widdershins
mailing list