Feeds

Neuromancing the law

Regulating the techno-regulators

Secure remote control for conventional and virtual desktops

Column According to the Information Commissioner we are now waking up to find ourselves in a surveillance society. But what is a surveillance society?

We can all see the cameras, so now everyone's chattering about CCTV. But what about the vast array of other technologies being sewn into the fabric of society? Who is controlling them, and with what implications?

Unfortunately, the world we are building might not be as safe as it is secure.

On 8 April, TELOS was launched. Fifty academics from around the world congregated at TELOS's inaugural conference on "Regulating Technologies".

The double entendre in the title of the conference was no accident and visiting academics spent their Easter weekend grappling with the extent to which we are being regulated by technology - from talking CCTV cameras to "cellular enhancements" - and the extent to which we can or should seek to regulate this technology.

Cyberspace promised freedom. We abandoned our fortified castles of privacy for virtual communication in the naïve belief that we would be free to roam anonymously where we wished. Increasingly, we find ourselves bombarded with spam and viruses causing the fearful to draw in their horizons and retreat to the secure corporate environments of TiVo, Sony, Mylo, and BlackBerry.

Jonathan Zittrain, professor of internet governance and regulation at Oxford University and co-founder of the Berkman Centre for Internet and Society at Harvard University said users are tethering themselves to the makers of these devices. The makers are thereby empowered to determine what the users can do with their product and the extent to which what they do is monitored by law enforcement.

Persistent PC users invest in or are involuntarily "protected" with "filtering mechanisms", justified on the basis that law enforcement of cybercrime is ineffective (as opposed to law enforcement's legendary effectiveness in preventing street crime?).

TJ McIntrye, lecturer in law at University College Dublin, asked whether the rhetoric of "filtering" (and the connotations with sewage and clean water) disguised its true nature and ruled out effective accountability. OK, information was piped into our home and was passively consumed, so perhaps it needs to be regulated - but how and by whom? Is unfiltered data unclean or dangerous for everyone?

Unlike older methods of censorship such as banning books, end users of automated filtering might not even be aware of the censorship. He gave the example of BT's Cleanfeed filtering system that tells users attempting to access an unauthorised site that it is unavailable owing to a technical fault; the end-users are deceived by the filter into believing that the temptation does not exist.

Unlike formal legal mechanisms that ensure a degree of public accountability (for example: the obscenity trial of D H Lawrence's Lady Chatterley's Lover, which lowered the threshold of censorship) filtering systems failed to provide a list of prohibited sites, their criteria for designation, prior notice of prohibition, or an appellate procedure.

He asked whether it is desirable that governmental authority for citizen control is delegated to non-state actors; whether it is desirable for governments to seek to shape the internet in such a way as to make certain crimes impossible, and whether this leads to a removal of responsibility from the individual.

Beginner's guide to SSL certificates

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
YARR! Pirates walk the plank: DMCA magnets sink in Google results
Spaffing copyrighted stuff over the web? No search ranking for you
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
Apple SILENCES Bose, YANKS headphones from stores
The, er, Beats go on after noise-cancelling spat
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.