Posts Tagged ‘surveillance’

Rheingold  (2002) writes in “Smart Mobs: The Next Social Revolution” that with the introduction of mobile technology that we are creating a peer-to-peer surveillance society. This is not necessarily an inherently bad thing, however, it could have many negative consequences for our society and culture.

Rheingold writes that “Orwell [author of 1984] didn’t take into account the possibility that computing and communication technologies would seduce consumers into voluntarily trading privacy for convenience” (p. 57). It reminds me of a documentary I watched recently titled We Live in Public, which documented an internet mogul’s artistic project, which was much more of a social experiment than an artistic endeavor. Josh Harris’ art project involved participants being on camera 24 hours, 7 days a week, and while watching the documentary I could see that once nothing was private – what was there to hide? Participants freely engaged in sexual acts, walked around with no clothes on, went to the bathroom and showered together. Participants were housed in a sort of “surveillance hotel” where there were cameras also mounted to watch them sleep (or enjoy each others’ company!), and they also had televisions mounted there where they could switch feeds and watch other participants. All the footage was filmed and stored and belongs to Harris. For me this brings to mind Rheingold’s thought that smart mob technologies pose three types of threats, including “[t]hreats to quality of life: [f]rom individual angst to deteriorating communities, it isn’t clear whether life in the informated society delivers convenience faster than it erodes sanity and civility [emphasis added]” (p. 65).

Critique of “Smart Mobs: The Next Social Revolution” by Rheingold, H. (2002):

The chapter for our week 9 reading was “Always-On Panopticon… or Cooperation Amplifier,” a chapter in “Smart Mobs” by Rheingold. It was a particularly interesting reading because it threw a twist into one of our course themes: maintaining privacy while using technology to communicate. The twist is that we are voluntarily giving this privacy away. Rheingold writes “issues of privacy today are complicated by the voluntary adoption of technologies that disclose private information to others” (p. 57). Another interesting part of the reading was the threat to quality of life that Rheingold mentions that may come hand-in-hand with extensive technology use (mentioned briefly above). Rheingold states “pervasive technology usage affects interpersonal relationships, the way individuals experience time, and the vitality of public spaces” (p. 59). Additionally, he asks “[i]f pervasive computation devices and anthropomorphic software agents lead people to confuse machines with humans, will people grow less friendly, less trusting, and less prepared to cooperate with one another” (p. 61)? While very interesting, it was also a fairly long reading and I can’t say my tired brain appreciated that very much. All in all, Rheingold is an easy author to read and think critically about.

Cover of "Smart Mobs: The Next Social Rev...

Cover of Smart Mobs: The Next Social Revolution

References

Rheingold, H. (2002). Chapter 8: Always-On Panopticon… Or Cooperation Amplifier?. In Fernyhough, L. (Ed.), Comm 105: Communication and Technology. Course Package: Winter 2012, (pp. 55-71). Victoria, BC: Camosun College Bookstore. (Reprinted from Smart Mobs: The Next Social Revolution, 183-215).

Interloper Films & Pawn Shop Creatives (Producers), & Ondi, T. (Director). (2009). We Live in Public [Motion Picture]. USA: Mongrel Media.

Cover of "Why Things Bite Back: Technolog...

Cover via Amazon

In “Why Things Bite Back,” by Edward Tenner, we are introduced to the concept of technological “revenge effects.” Tenner explains “[a] revenge effect is not the same as a side effect. If a cancer chemotherapy treatment causes baldness, that is not a revenge effect; but if it induces another, equally lethal cancer, that is a revenge effect” (p. 42). One of the revenge effects of the internet, I would venture, is the seemingly impossibility of legal regulation. The internet gives us unparalleled freedom of information, freedom of speech, and freedom from the law. This is not always the case, for online activity has also sparked criminal investigations, such as the Vancouver Riot suspects being apprehended through photos posted on Facebook, however, hate groups can practice hate speech online with apparent impunity. Does it matter where the author resides in determining if a crime has taken place? And if so, is it where they permanently reside – or where they were at the time their hate speech was produced on the internet? Does it fall onto the Internet Service Provider to conclude illegality? What about the location of the domain that is used – is that the locale from which a crime took place? This ambiguity is cause for concern.

At the same time, increased regulation such as the attempted introduction of  the Investigating and Preventing Criminal Electronic Communications Act, including the amendment of the Canada Criminal Code and other acts’ “would, among other abominable violations of civil liberties:

Require Internet service providers to give subscriber data to police and national security agencies without a warrant, including names, unlisted phone numbers and IP addresses.

Force Internet providers and other makers of technology to provide a “back door” to make communications accessible to police” (Karlin, 2012).

If this was actually put into action, even those who were doing nothing illegal on the internet could have their online activity monitored and their privacy breached by the police without needing to acquire a warrant. The revenge effect of attempted regulation would be the introduction of a “Big Brother” surveillance state. Is it even possible to strike a balance in the middle? I’m horrified by both hate speech and the possibility of a surveillance state – who is responsible for keeping us safe both from the internet, and for the internet?

A new theme is emerging in our Communications and Technology course: privacy and surveillance in the digital world.

Courtesy of Assault.it

Tenner explains:

The real revenge is not what we do intentionally against one another. It is the tendency of the world around us to get even, to twist our cleverness against us. Or it is our own unconscious twisting against ourselves. Either way, wherever we turn we face the ironic unintended consequences of mechanical, chemical, biological, and medical ingenuity – revenge effects, they might be called (p. 41).

In searching for possible solutions to the revenge effects of technology, I came across an incredibly interesting video. It is the introduction to a documentary created by The Venus Project. It was instantly appealing to me because they are attempting to address social problems such as inequality, discrimination, poverty, and power imbalance – to name a few, and also access to healthcare and proper environmental practices. They are acknowledging that the revenge effects that came along with the advent of machinery have lead to incredible social problems. What I find most interesting, is that they are proposing the responsible use of technology as the solution to the problem. Removing patents, and giving everyone equal access. Their documentary is appropriately titled “Paradise or Oblivion.”

Critique of “Why Things Bite Back,” Chapter 1: Ever Since Frankenstein by Tenner, E.:

I found this reading quite interesting in some parts, but somewhere around the middle it was a bit of information overload. Tenner provides so many examples of revenge effects from bugs in machinery that was designed to help us, to flame retardant children’s pajamas that ended up being carcinogenic. Despite my initial interest in the topic, because of the mid-term slump and the reading being long in comparison with others – it was hard to read right through to the end. It would have been easier if the examples were narrowed down somewhat.

References

Karlin, M. (2012, February 17). The Threat of ‘Big Brother’ Internet Monitoring in Canada. Rabble.ca. Retrieved from http://rabble.ca/news/2012/02/threat-big-brother-internet-monitoring-canada

Tenner, E. (1996). Chapter 1: Ever Since Frankenstein. In Fernyhough, L. (Ed.), Comm 105: Communication and Technology. Course Package: Winter 2012, (pp. 39-54). Victoria, BC: Camosun College Bookstore. (Reprinted from Why Things Bite Back: Technology and the Revenge of Unintended Consequences, 3-32).