Feeds

Neuromancing the law

Regulating the techno-regulators

Column According to the Information Commissioner we are now waking up to find ourselves in a surveillance society. But what is a surveillance society?

We can all see the cameras, so now everyone's chattering about CCTV. But what about the vast array of other technologies being sewn into the fabric of society? Who is controlling them, and with what implications?

Unfortunately, the world we are building might not be as safe as it is secure.

On 8 April, TELOS was launched. Fifty academics from around the world congregated at TELOS's inaugural conference on "Regulating Technologies".

The double entendre in the title of the conference was no accident and visiting academics spent their Easter weekend grappling with the extent to which we are being regulated by technology - from talking CCTV cameras to "cellular enhancements" - and the extent to which we can or should seek to regulate this technology.

Cyberspace promised freedom. We abandoned our fortified castles of privacy for virtual communication in the naïve belief that we would be free to roam anonymously where we wished. Increasingly, we find ourselves bombarded with spam and viruses causing the fearful to draw in their horizons and retreat to the secure corporate environments of TiVo, Sony, Mylo, and BlackBerry.

Jonathan Zittrain, professor of internet governance and regulation at Oxford University and co-founder of the Berkman Centre for Internet and Society at Harvard University said users are tethering themselves to the makers of these devices. The makers are thereby empowered to determine what the users can do with their product and the extent to which what they do is monitored by law enforcement.

Persistent PC users invest in or are involuntarily "protected" with "filtering mechanisms", justified on the basis that law enforcement of cybercrime is ineffective (as opposed to law enforcement's legendary effectiveness in preventing street crime?).

TJ McIntrye, lecturer in law at University College Dublin, asked whether the rhetoric of "filtering" (and the connotations with sewage and clean water) disguised its true nature and ruled out effective accountability. OK, information was piped into our home and was passively consumed, so perhaps it needs to be regulated - but how and by whom? Is unfiltered data unclean or dangerous for everyone?

Unlike older methods of censorship such as banning books, end users of automated filtering might not even be aware of the censorship. He gave the example of BT's Cleanfeed filtering system that tells users attempting to access an unauthorised site that it is unavailable owing to a technical fault; the end-users are deceived by the filter into believing that the temptation does not exist.

Unlike formal legal mechanisms that ensure a degree of public accountability (for example: the obscenity trial of D H Lawrence's Lady Chatterley's Lover, which lowered the threshold of censorship) filtering systems failed to provide a list of prohibited sites, their criteria for designation, prior notice of prohibition, or an appellate procedure.

He asked whether it is desirable that governmental authority for citizen control is delegated to non-state actors; whether it is desirable for governments to seek to shape the internet in such a way as to make certain crimes impossible, and whether this leads to a removal of responsibility from the individual.

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Apple CEO Tim Cook: TV is TERRIBLE and stuck in the 1970s
The iKing thinks telly is far too fiddly and ugly – basically, iTunes
Huawei ditches new Windows Phone mobe plans, blames poor sales
Giganto mobe firm slams door shut on Microsoft. OH DEAR
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.