Feeds

Smile: you're under global surveillance

Report details infrastructure, launches campaign

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

A newly-published report warns that a global infrastructure of registration and surveillance is emerging through the efforts of groups such as the EU, G8 and ICAO. According to the report, which was produced by the American Civil Liberties Union (ACLU), Focus on the Global South, Friends Committee (US), International Civil Liberties Monitoring Group (Canada), and Statewatch, anti-terror and security measures being driven largely by the US are being used to roll back freedom, increase powers and exercise increasing control over individuals and populations.

The report details a number of "signposts" on the road to global surveillance, and argues that these add up to a bigger picture where the aim is to ensure that "almost everyone on the planet is 'registered', that all travel is tracked globally, that all electronic communications and transactions can be easily watched, and that all the information collected about individuals in public or private-sector databases is stored, linked, and made available to state agents.

Most of the signposts are already clearly visible. Registration systems for foreigners, national ID schemes and biometric passports provide the registration process, while electronic borders, passenger data sharing and threat lists cover surveillance of physical movements. The increased sharing of database and their convergence at an international level have accelerated the globalisation of surveillance and security, while mutual legal assistance arrangements contribute to an erosion of democratic values and sovereign checks and balances.

The technological capacity of the structures being built "dwarfs any previous system and makes Orwell's book Nineteen Eighty-Four look quaint", says the report.

The result, however, will be a massive loss of freedoms in exchange for systems which do not succeed in their intended purposes, and which may even obstruct them by chasing down the blind alleys of predictive 'threat models' and risk profiling. "The initiatives described in this report are not effective in flagging terrorists or stopping their determined plans," it says. "They divert crucial resources away from the kind of investments in human intelligence we need to give us good intelligence about specific threats, rather than useless information on the nearly 100 per cent of the population that poses no threat whatsoever."

On the back of the report the groups have, with the support of around 100 civil liberties groups and NGOs world-wide, launched the International Campaign Against Mass Surveillance (ICAMS), which will campaign against mass surveillance-oriented anti-terrorism efforts. Commented Statewatch director Tony Bunyan: "Our message is that mandatory registration and mass surveillance are not the answers to the problem of terrorism, and not a road that any nation should be heading down. What is needed is good intelligence on specific threats - not the so-called 'risk-profiling' of entire populations and the generation of more information than can possibly be usefully analysed. There is a real danger that in trying to watch everyone you are actually watching no-one." ®

Related links:

Statewatch
Full report
Executive summary

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
Bose says today IS F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.