Feeds

Neuromancing the law

Regulating the techno-regulators

HP ProLiant Gen8: Integrated lifecycle automation

Column According to the Information Commissioner we are now waking up to find ourselves in a surveillance society. But what is a surveillance society?

We can all see the cameras, so now everyone's chattering about CCTV. But what about the vast array of other technologies being sewn into the fabric of society? Who is controlling them, and with what implications?

Unfortunately, the world we are building might not be as safe as it is secure.

On 8 April, TELOS was launched. Fifty academics from around the world congregated at TELOS's inaugural conference on "Regulating Technologies".

The double entendre in the title of the conference was no accident and visiting academics spent their Easter weekend grappling with the extent to which we are being regulated by technology - from talking CCTV cameras to "cellular enhancements" - and the extent to which we can or should seek to regulate this technology.

Cyberspace promised freedom. We abandoned our fortified castles of privacy for virtual communication in the naïve belief that we would be free to roam anonymously where we wished. Increasingly, we find ourselves bombarded with spam and viruses causing the fearful to draw in their horizons and retreat to the secure corporate environments of TiVo, Sony, Mylo, and BlackBerry.

Jonathan Zittrain, professor of internet governance and regulation at Oxford University and co-founder of the Berkman Centre for Internet and Society at Harvard University said users are tethering themselves to the makers of these devices. The makers are thereby empowered to determine what the users can do with their product and the extent to which what they do is monitored by law enforcement.

Persistent PC users invest in or are involuntarily "protected" with "filtering mechanisms", justified on the basis that law enforcement of cybercrime is ineffective (as opposed to law enforcement's legendary effectiveness in preventing street crime?).

TJ McIntrye, lecturer in law at University College Dublin, asked whether the rhetoric of "filtering" (and the connotations with sewage and clean water) disguised its true nature and ruled out effective accountability. OK, information was piped into our home and was passively consumed, so perhaps it needs to be regulated - but how and by whom? Is unfiltered data unclean or dangerous for everyone?

Unlike older methods of censorship such as banning books, end users of automated filtering might not even be aware of the censorship. He gave the example of BT's Cleanfeed filtering system that tells users attempting to access an unauthorised site that it is unavailable owing to a technical fault; the end-users are deceived by the filter into believing that the temptation does not exist.

Unlike formal legal mechanisms that ensure a degree of public accountability (for example: the obscenity trial of D H Lawrence's Lady Chatterley's Lover, which lowered the threshold of censorship) filtering systems failed to provide a list of prohibited sites, their criteria for designation, prior notice of prohibition, or an appellate procedure.

He asked whether it is desirable that governmental authority for citizen control is delegated to non-state actors; whether it is desirable for governments to seek to shape the internet in such a way as to make certain crimes impossible, and whether this leads to a removal of responsibility from the individual.

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.