Feeds

Neuromancing the law

Regulating the techno-regulators

The essential guide to IT transformation

Column According to the Information Commissioner we are now waking up to find ourselves in a surveillance society. But what is a surveillance society?

We can all see the cameras, so now everyone's chattering about CCTV. But what about the vast array of other technologies being sewn into the fabric of society? Who is controlling them, and with what implications?

Unfortunately, the world we are building might not be as safe as it is secure.

On 8 April, TELOS was launched. Fifty academics from around the world congregated at TELOS's inaugural conference on "Regulating Technologies".

The double entendre in the title of the conference was no accident and visiting academics spent their Easter weekend grappling with the extent to which we are being regulated by technology - from talking CCTV cameras to "cellular enhancements" - and the extent to which we can or should seek to regulate this technology.

Cyberspace promised freedom. We abandoned our fortified castles of privacy for virtual communication in the naïve belief that we would be free to roam anonymously where we wished. Increasingly, we find ourselves bombarded with spam and viruses causing the fearful to draw in their horizons and retreat to the secure corporate environments of TiVo, Sony, Mylo, and BlackBerry.

Jonathan Zittrain, professor of internet governance and regulation at Oxford University and co-founder of the Berkman Centre for Internet and Society at Harvard University said users are tethering themselves to the makers of these devices. The makers are thereby empowered to determine what the users can do with their product and the extent to which what they do is monitored by law enforcement.

Persistent PC users invest in or are involuntarily "protected" with "filtering mechanisms", justified on the basis that law enforcement of cybercrime is ineffective (as opposed to law enforcement's legendary effectiveness in preventing street crime?).

TJ McIntrye, lecturer in law at University College Dublin, asked whether the rhetoric of "filtering" (and the connotations with sewage and clean water) disguised its true nature and ruled out effective accountability. OK, information was piped into our home and was passively consumed, so perhaps it needs to be regulated - but how and by whom? Is unfiltered data unclean or dangerous for everyone?

Unlike older methods of censorship such as banning books, end users of automated filtering might not even be aware of the censorship. He gave the example of BT's Cleanfeed filtering system that tells users attempting to access an unauthorised site that it is unavailable owing to a technical fault; the end-users are deceived by the filter into believing that the temptation does not exist.

Unlike formal legal mechanisms that ensure a degree of public accountability (for example: the obscenity trial of D H Lawrence's Lady Chatterley's Lover, which lowered the threshold of censorship) filtering systems failed to provide a list of prohibited sites, their criteria for designation, prior notice of prohibition, or an appellate procedure.

He asked whether it is desirable that governmental authority for citizen control is delegated to non-state actors; whether it is desirable for governments to seek to shape the internet in such a way as to make certain crimes impossible, and whether this leads to a removal of responsibility from the individual.

Build a business case: developing custom apps

More from The Register

next story
Super Cali signs a kill-switch, campaigners say it's atrocious
Remote-death button bad news for crooks, protesters – and great news for hackers?
UK government accused of hiding TRUTH about Universal Credit fiasco
'Reset rating keeps secrets on one-dole-to-rule-them-all plan', say MPs
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
Felony charges? Harsh! Alleged Anon hackers plead guilty to misdemeanours
US judge questions harsh sentence sought by prosecutors
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.