Feeds

Neuromancing the law

Regulating the techno-regulators

Secure remote control for conventional and virtual desktops

Column According to the Information Commissioner we are now waking up to find ourselves in a surveillance society. But what is a surveillance society?

We can all see the cameras, so now everyone's chattering about CCTV. But what about the vast array of other technologies being sewn into the fabric of society? Who is controlling them, and with what implications?

Unfortunately, the world we are building might not be as safe as it is secure.

On 8 April, TELOS was launched. Fifty academics from around the world congregated at TELOS's inaugural conference on "Regulating Technologies".

The double entendre in the title of the conference was no accident and visiting academics spent their Easter weekend grappling with the extent to which we are being regulated by technology - from talking CCTV cameras to "cellular enhancements" - and the extent to which we can or should seek to regulate this technology.

Cyberspace promised freedom. We abandoned our fortified castles of privacy for virtual communication in the naïve belief that we would be free to roam anonymously where we wished. Increasingly, we find ourselves bombarded with spam and viruses causing the fearful to draw in their horizons and retreat to the secure corporate environments of TiVo, Sony, Mylo, and BlackBerry.

Jonathan Zittrain, professor of internet governance and regulation at Oxford University and co-founder of the Berkman Centre for Internet and Society at Harvard University said users are tethering themselves to the makers of these devices. The makers are thereby empowered to determine what the users can do with their product and the extent to which what they do is monitored by law enforcement.

Persistent PC users invest in or are involuntarily "protected" with "filtering mechanisms", justified on the basis that law enforcement of cybercrime is ineffective (as opposed to law enforcement's legendary effectiveness in preventing street crime?).

TJ McIntrye, lecturer in law at University College Dublin, asked whether the rhetoric of "filtering" (and the connotations with sewage and clean water) disguised its true nature and ruled out effective accountability. OK, information was piped into our home and was passively consumed, so perhaps it needs to be regulated - but how and by whom? Is unfiltered data unclean or dangerous for everyone?

Unlike older methods of censorship such as banning books, end users of automated filtering might not even be aware of the censorship. He gave the example of BT's Cleanfeed filtering system that tells users attempting to access an unauthorised site that it is unavailable owing to a technical fault; the end-users are deceived by the filter into believing that the temptation does not exist.

Unlike formal legal mechanisms that ensure a degree of public accountability (for example: the obscenity trial of D H Lawrence's Lady Chatterley's Lover, which lowered the threshold of censorship) filtering systems failed to provide a list of prohibited sites, their criteria for designation, prior notice of prohibition, or an appellate procedure.

He asked whether it is desirable that governmental authority for citizen control is delegated to non-state actors; whether it is desirable for governments to seek to shape the internet in such a way as to make certain crimes impossible, and whether this leads to a removal of responsibility from the individual.

Intelligent flash storage arrays

More from The Register

next story
Scrapping the Human Rights Act: What about privacy and freedom of expression?
Justice minister's attack to destroy ability to challenge state
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
EU to accuse Ireland of giving Apple an overly peachy tax deal – report
Probe expected to say single-digit rate was unlawful
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Hey Brit taxpayers. You just spent £4m on Central London ‘innovation playground’
Catapult me a Mojito, I feel an Digital Innovation coming on
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
EU probes Google’s Android omerta again: Talk now, or else
Spill those Android secrets, or we’ll fine you
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.