Wednesday 9 August 2017
Got them Graduate blues....
So three years of university have finally come to a close- and its time to become a functioning member of society...
Everyone says its difficult to find jobs at first; some say if you get a 2:1 or above you are most likely to get one faster and others say it takes longer than you might expect. Some say that people with 1st's even struggle finding a job on account of them being 'overqualified'- how bloody bonkers is that? Some say I should aim high and go for the highly sought after post-grad 'career-type jobs', whereas others say I should start small and gain more experience. Honestly after years and years of education, I still have no idea what I want to be when I 'grow up'. I went to a good uni and came out with a 2:1, yet I have basically zero experience in the working world which is making it extremely difficult to get a job whether it be at graduate or entry level. I barely have any clue what I would be good at, but hey- "i'm still applyin', still tryin'".
My mother got a job working at Burberry at my age (21) with a 2:2 bachelor's degree and yet now I wouldn't be able to get the same job without 3 years retail experience in luxury or designer brands and some experience in customer service. Even high-street or smaller retail stores require some experience nowadays. The question is- how am I meant to get any kind experience in anything if employers won't hire me because of my lack of experience? The experience paradox.....
...
At this point I am applying for anything- but jobs I feel I could take on and do well. I have learnt that I should be open to and apply for as many jobs as possible at differing levels and job descriptions, however I am also allowed to filter through jobs that suit my personality and abilities and retain some expectations/goals for myself.
Some say i'm not trying hard enough, or that I think i'm better than certain jobs. Maybe they're right, but maybe i'm still trying to figure myself out whilst navigating this new world, all the while not losing too much of who I already am. Millennials aren't 'lazy and entitled' like some older generations believe. We have so much to offer with our knowledge over new tech, social media, new forms of communication and lifestyles and high levels of computer skills attained from childhood. We are more in touch with what's going on around us whether that be something as menial as pop culture or the great changes and disparities within our current socio-economic and political climate. Teens know a lot more know then I did at their age and with this new found knowledge- the job market becomes more and more competitive, especially now that most 18 year olds are expected and even required to attend uni. I have lived through a time with no internet and then with the surge and exponential growth of the 'digital age', we as children adapted and grew up in a completely different way than from our parents generation.
Millennials are probably disillusioned with the fact that its so much harder now than it was for our parents generation to buy and own a house by the time their 30 as living expenses are climbing each year. Realistically, I probably will never own a house like my idyllic childhood house in West Acton, perhaps only until I am in my 40s. London is my home and so far the only place I feel truly happy. Being a Londoner has provided me with such a passionate, diverse, multi-faceted, accepting and open perspective and outlook on life. I found that during uni i'd even vibe best with Londoners before even knowing that that was where they were from. I don't believe I should have to give up my only dream of living out my young adult life (possibly all my life) here just because of the competitive and expensive nature of it. I'm willing to work harder and go through the necessary struggles if it means living in such an amazing city. London is the one thing I have in my life that is my own and when people tell me to move out of it for a job, I probably never will. Its scary embarking on this journey into adulthood especially whilst listening to the never-ending and contradictory advice from generation X and Z alike telling us graduates what we should and should not do. But as long as I have the comforting chaotic sounds and crazy atmosphere of this wonderful urban landscape- I know I achieved what I truly wanted for my life.
BTW I'm not trying to sell myself short; I have some work experience but because it was so long ago and unfortunately in a field I can't apply for jobs in (financial consultancy) due to my dyscalculia/dyslexia- I don't think it is doing me much good. I have acquired certain skills yet I have a feeling nobody really cares for my Duke of Edinburgh Bronze certificate, broken sign language or first aid qualifications from 2009...
Nonetheless, this is all part of figuring out what my role is in this life and the beginning is always meant to be tedious. I used to envy those with minds smart enough to have a clear cut path into a career being a vet, doctor, dentist etc because they seemed to have it all figured out and was able to navigate the world with more guidance and purpose. However, I suppose I have more freedom in what I may do with my life because nothing has been decided yet for me. For every unpaid internship /contributions and zero hour contracts out there: there will be a good, steady job that will want me, but most importantly- I'll want it.
XX
Saturday 17 June 2017
DISSERTATION- How has state surveillance challenged the security of our personal privacy and freedom?
[This blog post is an edited essay of mine from my final year at University of Birmingham©]
Bibliography
Introduction
In
the book ‘1984’, George Orwell described a police state dystopia in which the
government (or ‘Big Brother’) is constantly watching its public. This
oppressive and paranoiac fictional world he created seems highly improbable,
yet the themes it explores could be plausible under current surveillance
strategies. How much of this world is possible for our future within the
constraints of western democracy and how much of it are we already
experiencing?
In
this essay, I want to analyse the relationship between the state and the
public. It is now generally understood that the government can tap into our
private lives through innumerable and highly covert ways (detailed in the next
chapter), but this does not mean it is commonly accepted. With ongoing
technological advancement in this ‘Digital Age’, there is an increasing concern
as to just how far our personal liberty and rights are being impinged upon.
Thus, organizations such as ‘Don’t Spy on Us’ and ‘Big Brother Watch’ were
created, endeavouring to protect the public against strict surveillance tactics.
In an age
where technology has become a significant aspect of our everyday lives, it is
important not only to acknowledge how its application benefits us, but how it
is also used against us. With increasing fear over organized terrorism,
security is becoming a progressively important aspect of government policy. With legislation such as ‘The Freedom of
Information Act’ (passed by Parliament in 2000), the public are allowed more
access over some governmental dealings and information held by public officials,
however much of this is still ‘protected’. ‘WikiLeaks’ and other journalistic
organisations help to some extent in gaining insider knowledge but many argue
that the public should have more access in order to provide adequate checks and
balances on our elected officials so to monitor their activity. However do
these public exposé’s help or hinder society and government? Do the state and
powerful corporations have too much power over our personal freedom with
surveillance through techniques such as CCTV and the ‘surface’ web? Can we have
security without our freedom being eroded?
My approach is to first identify some
of the various methods in which the government uses in order to surveil its
people. I want to demonstrate that government and certain corporations do in
fact hold too much control over surveillance and that the public is entitled to
some unobserved activity under the quintessential democratic right of freedom.
This can ultimately be experienced through my case study of ‘the Deep Web’. The
deep web offers pure anonymity to the public as well as the governments who use
it, aiding both equally. It embodies the fundamentals of liberal thought and
the freedom it offers its users helps the plight of many who are in extremely
difficult circumstances. Technically, using such software is illegal but
theoretically, this does not make it wrong. I want to analyse the many ways in
which both the public and government utilise this tool in order to exhibit its
incredible potential for good, as well as bad. By examining different arguments
for and against less surveillance, I will argue in favour of and frame this
essay around Michel Foucault’s poststructuralist approach to power and
surveillance. This is the critical theoretical perspective that analyses
knowledge and power and how this impacts social control through certain
institutions, as “…policymakers seek to constitute themselves as having
authority…their formal authority is derived from their institutional location,
but authority is also built on knowing about a particular issue. Knowledge,
therefore, becomes important for establishing authority, and this in turn
creates a new analytical optic for discourse analysis…” (Hansen, 2007, p8) of
security. This is in contrast to various alternative perspectives such as the
notion, ‘if one has nothing to hide, one has nothing to fear’ or that strong
surveillance is always in the interest of the people and so on. I conclude that
limitations within legislation need to be set on the surveillance of the
public, especially as we see it being used more often to boost commercial sales
for businesses rather than for security purposes. Overall, there needs to be
less intervention by the state and other powerful bodies onto the public as
heavy surveillance is quickly surpassing ‘national security’ and ‘effective
screening’ and becoming more about the need for full control, infiltrating
every aspect of our daily lives, manifesting itself as fear, paranoia and
overbearing monetization.
Surveillance
Society: Techniques
There are various techniques that are used in order
to surveil the public and the UK is one of the most watched places with one of
the biggest DNA databases and millions of public cameras. According to the
‘BBC’ (British Broadcasting Company), these include Drones, ANPR, CCTV,
Bugging, Trackers, Databases, Key loggers, DNA, Biometrics, and so on. Many surveillance
drones are unmanned and have been deployed by the police since 2008. This type
of aerial surveillance use cameras to operate 24/7, transmitting live images
and recording “many different activities such as searching for firearms or
missing persons, road traffic accidents and surveillance after a terrorist
attack.” (BBC, 2009, part 1). ‘ANPR’ (Automatic Number Plate Recognition) was “Initially
used to combat terrorism…Only in the last few years has the system been used on
a large scale.” (BBC, 2009, part 2). Police databases employ this to tag
vehicles of ‘special interest’ and to spot any crimes that may be linked to a
vehicle’s number plate. “The system works by recording every number plate
regardless of who the driver is, no matter how mundane the journey. Every
journey is then held for two years and can be held longer if considered
necessary…cameras are not concealed (but) the police will not reveal how many
cameras they have or where the cameras are.” (BBC, 2009, part 2). ‘CCTV’
(Closed-Circuit Television) were originally installed for guarding properties
and commercial premises but rapidly became commonplace throughout the urban
setting with an estimated 4.2 million of them, including new features such as
microphones. “A Home Office report in 2005 revealed that CCTV had not been a
success. It did not stop crime, it just moved it away from the cameras and it did
not make people feel safer. However, CCTV can be effective after a crime has
been committed to detect the perpetrator and cameras remain at the heart of the
government's drive against anti-social behaviour.” (BBC, 2009, part 3). ‘DNA’
profiles contain about 7.4%
of the population and is taken from any arrested individual
(innocent or guilty) over 9 and kept permanently. This led the ‘European Court
of Human Rights’ to label the “government's DNA policy in England and Wales indiscriminate
and particularly damaging to children and asked the government to change it.”
(BBC, 2009, part 8). ‘Biometrics’ use fingerprinting, DNA and iris and face
recognition to identify our behavioural and physical characteristics, however
“…they are only as good as the information inputted, which can be incorrect” (BBC,
2009, part 9) meaning there can be many false matches. ‘Bugging’ allows
conversations to be recorded and accessed by the police, security services and
increasingly public bodies, while data is stored by internet and telephone
companies. “The Home Office says that it uses communications data in 95% of
serious crime convictions and every single terrorist investigation since 2004
has employed communications data.” (BBC, 2009, part 4). ‘Voice over Internet
Protocol’ (VOIP) is a complex system of breaking down voice information and
controversially, “This has required the security services to develop different
techniques for interception. It is also one of the reasons the government argues
it needs new powers to require all communications service providers to keep all
their communications data for a year.” (BBC, 2009, part 4). ‘Tracking’ devices
can either use telephone signals or satellite for vehicles (through GPS or
Global Positioning System) in order to track anyone’s location. ‘Key loggers’
record computer operations and can be “used to trace computer faults and to
monitor employees, for example to determine productivity. They are also used by
law enforcement agencies and criminals to obtain passwords and bypass other
security measures.” (BBC, 2009, part 7). ‘Databases’ have increased
exponentially with our ever-advancing technology, recording our welfare,
education, health and justice. A report was made that out of “46 major government
databases…11 needed to be scrapped or redesigned immediately, and more than
half were deemed to have significant problems with privacy or effectiveness.”
(BBC, 2009, part 6). Most controversially, the “National Identity Register
(stores) biographical information, biometric and administrative data linked to
an ID card.” (BBC, 2009, part 6). Any government database can find any personal
information about anyone from their ID. However, the acquisition of personal
information on databases are being utilized more by private companies for
loyalty cards, banking and even commercial shopping. Personal data of a vast
number of individuals has even been lost or stolen from private and governmental
databases, “In 2007 the government lost two computer discs containing a copy of
the entire child benefit database with the personal details of all families in
the UK with a child under 16. The discs held the details of 25 million people,
including name, address, date of birth, National Insurance number and where
relevant bank details.” (BBC, 2009, part 6). Surveillance is not only used for
intelligence purposes, but also to encourage spending. Advertising and
‘cookies’ (pop ups that show websites you recently visited) are unavoidable
whilst one ‘surfs the web’. Everything we do online is being watched, monitored
and tracked: even our mundane shopping. This continuous bombardment of
commercialism through ads can appear suffocating and oppressive.
The increasing amount of advanced surveillance
methods were kept relatively secret until ‘whistle-blower’ Edward Snowden
famously revealed in 2013 that U.S and U.K governments were engaging in mass
surveillance of their citizens. He disclosed secret information in regards to
‘PRISM’; a surveillance program under the NSA (National Security Agency) which
oversees and collects data from sites such as ‘YouTube’, ‘Facebook’ and so on.
He exposed the fact that PRISM was accumulating “…consumers' personal data by
forcing those private companies (such as Google, Microsoft, Apple, or Skype)
regularly collecting vast amounts of data for commercial purposes to hand it
over to the intelligence services without the knowledge of users.” (Bauman et
al, 2014, paragraph 4). Snowden believes we have no privacy from mass
surveillance and due to his exposé, is continuously vilified by the U.S
Government as a traitor. However many consider him a hero and a patriot. Since
this revelation, suspicion and fear of rights being eroded have led to the
creation of a movement for the reform of certain governmental dealings over
intelligence, in particular information privacy, mass surveillance, nationals
security and government secrecy. One manifestation of this is the organisation
‘Don’t Spy On Us’; their key principles are “no surveillance without suspicion,
transparent laws not secret laws, judicial not political authorisation,
effective democratic oversight, the right to redress and a secure web for all”
(dontspyonus.org, date unknown, part 4). They call for surveillance to be solely
targeted at suspected criminals, for judges rather than politicians to justify
when it is necessary, and for security agencies to be held accountable to
elected representatives. Another organization is ‘Big Brother Watch’, who
believe in defending civil liberties and protecting individual privacy. They provide
extensive research for Parliament, media and government reports into “the dramatic
expansion of surveillance powers in the UK, the growth of the database state
and the misuse of personal information.” (bigbrotherwatch.org, 2017, part 1).
Two significant laws have been formulated; the
‘Investigatory Powers Act’ (passed by Parliament in 2016) and most recently,
the ‘Digital Economy Bill’ (currently being processed by Parliament, 2016/17);
specifically “Part 5 of the Bill will fundamentally change the way our data
will be shared with government, public authorities, councils, charities and
with private businesses such as gas and electricity companies.”
(bigbrotherwatch.org, 2017, part 1). The Investigatory Powers Act is arguably
the most controversial bill in terms of surveillance in recent times. According
to dontspyonus.org, all communications over the internet will be collected and
stored in order to analyse it and keep a track on every individual (even those
not suspected of any crimes). Personal devices can be hacked without suspicion
and every person’s web history will be made available to various agencies. This
erodes our right to privacy from both the government and corporations. Our
freedom of expression will in turn be disrupted by the government’s threat of
arbitrary interference. The ability to share and discuss through online
exploration will become more self-monitored and will change the way we interact
online. Bulk hacking powers weaken any security we have on the internet. Intelligence
can be shared between the UK and the US with no restraints. This is because the
‘GCHQ’ (Government Communications Headquarters) is close to the NSA, this will
mean that mass surveillance capabilities will be overseen by President Donald Trump.
Some fear that this immense power could possibly be in the hands of a considerably
provocative and divisive person (New Scientist, 2016). Finally, investigative
journalism will be dramatically affected as the bill “lacks sufficient
guarantees for the protection of journalists and their sources. It also fails
to require authorities to notify journalists before hacking into their devices.”
(dontspyonus.org, 2017, part 2).
Our fundamental rights of freedom and privacy need
to be sustained against potentially malign practices within the digital sphere.
Democratic and legal transgressions need to be considered as the long-term
implications of these methods may mean “historical shifts in the locus and
character of sovereign authority and political legitimacy.” (Bauman et al.
2014, paragraph 2). Thus, many are calling for “an urgent need for a systematic
assessment of the scale, reach, and character of contemporary surveillance practices,
as well as the justifications they attract and the controversies they provoke.”
(Bauman et al, 2014, paragraph 2). Snowden’s revelations over surveillance
sparked worldwide debate on national security and the need for more scrutiny of
those in power. However, some argue that mass surveillance is only in the
interest of the public’s safety and convenience (in terms of marketing). Many
maintain that concerns over privacy and freedom are merely ‘exaggerated’ or just
radical liberal notions of authoritarian rule overtaking democracy. Nevertheless,
surveillance is such a subtle and pervasive part of everyday life that
compliance can seem like people are learning to blindly accept or ignore
potentially dangerous government behaviour. A key aspect of a liberal democracy
is the ability to challenge governmental power in order to provide checks and
balances on authority. As Michel Foucault explains, surveillance is a network
of power that naturally generates resistance as “power requires resistance as a
force immanent to its action” (Bogard referencing Foucault, 1996, p98). His
analysis provokes resistance as we begin to question and challenge power relations
and come to perceive power as ubiquitous. “‘The question becomes, when the
government adapts their practices, takes advantage of new technologies that
some think are perfectly justified, what impact does that have on the freedoms
that we cherish?’” (Gordon quoting Nossel, 2013, paragraph 19). Thus, one can
use Foucault’s theory to critique heavy surveillance and analyse its impacts.
Surveillance
as Power: Impacts
Surveillance is effectively ‘hierarchal
observation’, which maintains control through guardianship (or what the state
considers national security). It impacts every person’s psyche, private and
public behaviour, human rights as well as democracy as a whole. Foucault’s
post-structuralist analysis of power explains how social surveillance is like
‘capillaries of power’ where “the power differentials of everyday interactions
are more immediately significant than whatever the NSA and its cognate agencies
are doing.” (Bauman et al, 2014, paragraph 5). Surveillance is a distinct form
of power, exercised through Foucault’s notion of ‘governmentality’. This
concept refers to the ‘analytics of government’ as generically
historical-descriptive. It studies “‘the close link between power relations and
processes of subjectification’…Foucault speaks of governmentality as ‘a
strategic field of power relations in their mobility, transformability, and
reversibility…’” (Hutter et al referencing Foucault, 2014, p274). He perceives
power as the ‘conducting of conduct’, structural, fluid and operating within
society as “permanent, repetitious, inert, and self-reproducing…” (Foucault,
1978, p93). Power cannot be possessed, but is exercised productively and
preventatively, always against some resistance, “resistances that are possible,
necessary, improbable; others…spontaneous, savage, solitary, concerted, rampant
or violent; still others that are quick to compromise, interested, or
sacrificial”, only existing within the strategic field of power relations
(Foucault, 1978, p98). Foucault’s non-prescriptive theory of power is
distinctively related to knowledge (through discourse and perceptions) and does
not involve normative ideas of thought or behaviour. He argued that “discourse
never merely describes but rather, creates relationships and channels of
authority through the articulation of norms…discourse simultaneously
constructs, positions, and represents subjects in terms of norms and deviations
posited by the discourse…” (Brown, 2006, p71). Language frames power relations and
representation is constitutive of society and its subjects. Foucault explored
the evolution of power in the modern state through past and present disciplinary
measures (how we exercise punishment), from being enforced physically in the
past, to mentally now. Public executions and ritual torture gradually became
‘shameful’ acts inflicted by the executioner and “seen as a hearth in which
violence bursts again into flame.” (Foucault, 1995, p9). Organized expiations
became grotesque and it was thought that “The punishing power should not soil
its hands with a crime greater than the one it wished to punish.” (Foucault,
1995, p56). Thus, punishment was transformed from public and violent to private
and more invasive.
Foucault drew upon Jeremy Bentham’s concept of
Panopticism to inform on his study of modern surveillance and disciplinary
power relations. A panopticon is an institution that allows a watchman to
observe occupants of a space without them knowing when they are being watched.
The watchman is concealed and equipped with a weapon in which he can use on any
person displaying disobedient activity. The idea is that one will police
themselves in order to divert punishment by the watchman. Foucault considered
panopticism a part of many contemporary institutions because of society’s
intense monitoring and bureaucratic nature.
This concept inspired CCTV in the hope that people would curb their own
behaviour, consoling the public with ideas of “‘empowerment’ and ‘freedom’,
particularly the ‘freedom and safety to shop’.” (Allmer quoting Coleman and
Sim, 2011, p572). However, many argue that criminals will now purposefully
commit crimes away from cameras and so illicit activity is not actually being
deterred. As evidenced by the London riots (2011), mass crime was not hindered
by surveillance. This may be because “We behave ourselves because of our social
contract, the collection of written and unwritten rules that bind us together
by instilling us with internal surveillance in the form of conscience and
aspiration. CCTVs everywhere are an invitation to walk away from the contract
and our duty to one another, to become the lawlessness the CCTV is meant to
prevent.” (Doctorow, 2011, paragraph 12). This suggests that CCTV surveillance
is meant to create a moral standard, but it is actually within our individual
autonomy that truly ethical surveillance lies. By relying on heavy governmental
surveillance to supervise us, we transfer any responsibility towards the law
onto another institution other than ourselves. Nevertheless, “Evidence-led CCTV
deployment shows us where CCTV does work, and that's in situations where crimes
are planned” (Doctorow, 2011, paragraph 11). The knowledge of being constantly
observed at all or most times forces people to internalise the threat of
violence (or punishment) from institutional power. Another example of
Panopticism in practice is the use of ‘dummy cameras’, which unbeknownst to the
public do not actually record anything in reality but its perceived observational
power serve to generate docile subjects of those who believe it records them.
Hence, the Panopticon induces “the
inmate (into) a state of conscious and permanent visibility that assures the
automatic functioning of power. So to arrange things that the surveillance is
permanent in its effects, even if it is discontinuous in its action; that the
perfection of power should render its actual exercise unnecessary” (Foucault,
1995, p201). This system sustains “a power relation independent of the person who
exercises it…the inmates should be caught up in a power situation of which they
are themselves the bearers” (Foucault, 1995, p201).
Foucault’s view was that the awareness of being
constantly watched can stifle creativity and individuality which in turn
creates conformity or ‘dynamic normalisation’, “…the activity of judging has
increased precisely to the extent that the normalizing power has spread…The
judges of normality are present everywhere. We are in the society of the teacher-judge,
the doctor-judge, the educator-judge, the 'social worker'-judge; it is on them
that the universal reign of the normative is based.” (Foucault, 1995, p304).
Consequently, this eradicates the notion that it is everyone’s democratic right
to retain free will and freedom of thought. Surveillance asserts a domineering
and shadowy supervisory power that generates an obedient society. One can
theorise through Foucault’s theory that society can be perceived as a subtle
yet increasingly totalitarian state, disguising itself as fully democratic.
Foucault’s realist “emphasis on discourse and the critique of sovereignty
significantly challenges both the materialism and the state-centrism of that
tradition” (Brown, 2006, p76), necessitating state surveillance to be
constantly challenged and improved upon in order to provide the public with
more personal privacy and freedom. Foucault argued that we are taught to
perceive the past in a negative way in order to believe we have come a long way
since the ‘Dark Ages’ in a kind of naïve smugness. He maintained that the
modern prison system was formulated in private, arguing that this was so that
the public would be blissfully unaware of any barbaric or unethical
‘punishment’ and thus unable to resist this form of state power and control. He
reflected upon past brutal and savage forms of punishment as a better
representation of a more equal power relation between the state and the public
as people had more individual freedom. These public executions encouraged open
protests and rebellions while sparking debate and controversy. Crime was more
openly dealt with and thus power was more transparent making it superior in
some ways to our modern state. Foucault felt it was important to acknowledge
the dishonest and ignorant optimism instilled in us from the state over current
power relations surrounding surveillance and punishment and to learn some
lessons from history without fully reverting back to such violent acts. He
considered “imprisonment as a legal penalty, but at the ‘illegal’ use of
arbitrary, indeterminate detention…Sometimes in the name of the effects of
imprisonment, which punishes those who have not yet been convicted, which
communicates and generalizes the evil that it ought to prevent, and which runs
counter to the principle of the individuality of penalties by punishing a whole
family; it was said that ‘imprisonment is not a penalty’.” (Foucault, 1995,
p119-120). Foucault saw the modern prison system as an abuse of power and incompatible
with justice because of its very nature of punishment control and how it
deprives a person of everything they hold precious or that provides them with
subsistence. Contemporary power through punishment naturally appears more
compassionate on the surface in retrospect to past methods, therefore we
willingly accept what is secretly decided for us and how it may affect our
behaviour. Some consider the state a ‘sofa government’ that casually make key
decisions informally with unofficial advisors. Hence a more negotiated, open
and transparent relationship needs to be recognised between the public and the
state in order for surveillance to have some restraints and to be as democratic
as possible. The state’s role (in terms of surveillance) is contradictory as it
both liberates and oppresses the public. Some accept surveillance and its invasive
nature, giving up some personal privacy for security provided by the government
or for new technological updates, apps, improved shopping, use of social media
and other such benefits provided by businesses. To Foucault, power is
ubiquitous and belongs to everyone yet it is the general public who become
repressed by power enforced upon them by authority, “Power in this view is
thought to be contained in sovereign individuals or institutions and to be
exercised over others by these individuals and institutions.” (Brown, 2006,
p68). Through panoptic surveillance in a disciplinary society, repression and
fear begin to supersede collective and particularly individual ethics and
morals. One removes any need for punishment when fear prevents the public from
acting before they even commit an act. Right and wrong are already decided for
us, removing any individual responsibility towards one’s own morality and
conscience.
Many believe widespread hierarchal observation is
becoming increasingly normalised, despite its controlling means to deter, train
and correct human behaviour. The overall implications of this is that people
have begun to self-vet themselves in fear of exposure of private details about
their life or of any possible misunderstandings over an opinion or joke due to ambiguous
‘online language’ on social media. Understandably, ‘malicious communications’
can land a person in court with a fine or even a sentence if it were deemed a
hate crime, “British police are arresting people in the middle of the night if
they have made racist or anti-Muslim comments on Twitter” (Edwards, 2013,
paragraph 1). However, a simple harmless, misconstrued or unpopular opinion
shared online has the potential to ruin a person’s livelihood and professional
reputation, even resulting in punishment by the law. It is believed that, “Of
the more than 500 writers…surveyed, one in six said they had avoided writing or
speaking about a certain topic, and almost one in four reported that they had
self-censored via e-mail or on the phone.” (Gordon, 2013, paragraph 2).
Surveillance has created a somewhat paranoid culture in which one must maintain
the status-quo and avoid going against mass opinion. Many ‘self-police’
themselves by generally censoring what they do and say online, curbing their
behaviour on media forums created to share personal events and opinions that
inspire meaningful authentic debate such as on Facebook. It has been reported
that posts containing user’s own images and words, or “‘original broadcast
sharing’…fell 21 percent from 2014 to 2015, contributing to a 5.5 percent
decrease in total sharing.” (Bercovici, 2016, paragraph 2). Many people are now
censoring what they post on large social media platforms, in favour of smaller
networks such as ‘Snapchat’ for example, perhaps because they do not trust
large corporations with their private details (especially now that advertising companies
have capitalised on such websites to boost sales) and to retain some level of privacy.
In response, Facebook created new updates that would allow easier access to
photos from your phone’s camera to be uploaded, nostalgic and personal videos
were created to encourage user’s to share more information and live-streaming
videos has become the newest feature in their bid to stay popular. Some
reported these updates were far too invasive, bothersome and even dangerous. An
example of ‘unsafe use’ was exhibited when a young girl hung herself on
Facebook’s live-stream. Facebook tried to remove the video but it had been
shared and re-uploaded so many times that anyone could search for it.
Similarly, “Twitter’s own live streaming platform, Periscope, faced criticism
after an alleged sexual assault and a young woman’s suicide were both shared
online.” (Fussell, 2016, paragraph 8). These new ways of sharing online can be
abused and the protection of privacy can be lost. “Facebook’s decision was met
with anger. Essentially, the social network had severed its own vaunted ‘open
connection’ between its users at the behest of the very organization whose
abuses were being documented across the site. The event revealed to many
lauding its revolutionary potential that Facebook’s commitment to open sharing
across the world is tenuous.” (Fussell, 2016, paragraph 11). This confirms how
the internet cannot be fully void of surveillance so to prevent harmful content
being uploaded onto sites that are often used by the greater public, which
includes children. In response, many argue that we should be realistic about
online material and accept that there will always be ‘controversial content’
shared online. They contend that this type of content requires another open
forum that is not readily available to the general public so to prevent it
being seen by those who have not searched for it. This space would be the ‘Deep
Web’.
In an age of digital fingerprinting technology
threatening the way we interact online, many have taken to certain networks in
order to retain some freedom against the ever watchful and repressive eye of
the law. Particular networks such as the Deep Web is the largest anonymous tool
covertly available to regain control over individual privacy and freedom,
tipping the scale slightly within the current power relation of a domineering
‘surveillance state’ to a fully unrestricted and autonomous agent. The general
awareness of surveillance and its impacts have arguably created a culture of
fear, mistrust and secrecy. An exemplary manifestation of this is project ‘Dead
Drops’. This is an anonymous network that have hidden thousands of USB flash
drives in various public places all around the world. It was created in order
to combat internet surveillance by freely sharing files via external
hard-drives only, bypassing the need to connect to the web. People can upload
anything to these public USB’s and because it does not take place on the
internet, it does not break any download laws (Bartholl, 2010). This
demonstrates that there is a real desire to gain back personal privacy and
freedom against oppressive state surveillance.
Against
Surveillance: The ‘Deep’ Web
This
case study is extremely important in analysing whether a free and open (zero
surveillance) space is a necessary and positive environment for adults today.
It is arguably the greatest example of a liberal democracy within the ‘New
Media Age’. The deep web makes up approximately 96% of the World Wide Web’s (or
‘surface web’) networked web pages (Epstein, 2014, paragraph 1). This
subsection of the web is invisible to standard surveillance methods due to
encrypted network servers and because it is not accessible by usual surface web
browsers. Michael Bergman discovered that this uninspected resource is 400 to
500 times larger than our commonly used surface web. He argued that “If the
most coveted commodity of the Information Age is indeed information, then the
value of deep Web content is immeasurable.” (Bergman, 2001, paragraph 5). Original
content from the deep web currently exceeds all global printed content, the “International
Data Corporation predicts that the number of surface Web documents will grow
from the current two billion or so to 13 billion within three years, a factor
increase of 6.5 times; deep Web growth should exceed this rate, perhaps
increasing about nine-fold over the same period.” (Bergman, 2001, paragraph 1).
Many believe that this tool ought not be ignored, but utilized due to its impressive
size. It undeniably can provide users with a deep and indispensable wealth of
knowledge as well as full access to profuse amounts of unfiltered
representations and reflections of every part of the human psyche.
This
immense document or record can be particularly useful to scholars, journalists,
investigators, academics, political activists, dissidents and so on. “In a
time of widespread state censorship and surveillance, and persecution of
minorities and activists in many countries, even in democracies, the
availability of such a platform for anonymous communication and publishing is
considered by many essential to protect freedom of expression.” (Frediani, date
unknown, paragraph 19). Consider a writer researching the preparations and
contingency plans America had for a nuclear attack during the Cold War. They
stated, “‘I decided to put the idea aside because…what would be the perception
if I Googled ‘nuclear blast,’ ‘bomb shelters,’ ‘radiation,’ ‘secret plans,’
‘weaponry,’ and so on? ...are librarians required to report requests for
materials about fallout and national emergencies and so on?’” (Gordon quoting
an anonymous author, 2013, paragraph 4). The fear of potential punishment can
limit our knowledge and exploration, discouraging the positive desire to enrich
the education of humanity. This deprives us of our democratic rights to freedom
of expression and speech. The freedom to search for anything on the deep web
provides solace to those seeking knowledge. There are many other reasons a
journalist (for example) may want to keep their research private. It is
conceivable that a journalist’s country may be undergoing war, revolution, or
perhaps there are exceptionally strict and unfairly limiting surveillance laws
decided by an ‘ethically ambiguous’ state. However, “These days it is not just
journalists working in repressive regimes that need worry. Increasingly, outwardly-democratic
governments are tightening control over the Internet and those who use it.”
(Pearce, 2013, p4). It is feasible to consider a journalist’s research may be highly
provocative or controversial and so their browsing activity could be dangerous
if misconstrued. Alan Pearce, author of ‘Deep Web for Journalists’ contended
that “‘The internet is a dangerous place for journalists’…And starting an
investigation–whether into child sex abuses or terrorist activity–might set off
alarm bells with the security services. ‘A device will quickly be planted in
your computer to follow you around’” (Marshall referencing Pearce, 2013,
paragraph 1). Many believe “‘Mass surveillance is a threat…And the press, as a
cornerstone of democracy, has never faced such a threat.’” (Marshall quoting
Pearce, 2013, paragraph 1). Thus, the need for journalists to ‘go off the
radar’ for the safe transferring of confidential files and the protection of
important sources is becoming more of a requirement for this type of work in
the 21st century. “There are many journalists who use Deep Web tools
like the German Privacy Foundation’s PrivacyBox to communicate securely with
whistle blowers and dissidents. Aid agencies use similar techniques to keep
their staff safe inside of authoritarian regimes.” (Pearce, 2013, p6). As a
result, the deep web can be tremendously resourceful and liberating for many
people worldwide.
There are many hidden networks one can use to
access the invisible web; a commonly referenced one is ‘TOR’ (‘The Onion
Router’). Through Tor, “people may communicate secretly and securely away from
the attention of governments and corporations, scrutinize top secret papers
before WikiLeaks gets them, and discuss all manner of unconventional topics.
Ironically, Tor…was set up with funds from the US Navy” (Pearce, 2013, p6) for
covert communication. The deep web is equally useful to both the public and the
state, thus it can be considered one of the only contemporary examples of a
‘level playing field’ where there is no fixed power dynamic. There have been
many instances of gross misconduct by certain institutions such as releasing personal
information. For example, ‘Tesco’ Bank (in 2016) “froze its online operations–after
as many as 20,000 customers had money stolen from their accounts…40,000
accounts had been compromised” (Dunn, 2017, part 3). Another example was in
2007, ‘HM Revenue and Customs’ had “Probably the most infamous large data
breach ever to occur in the UK, two CDs containing the records of 25 million
child benefit claimant in the UK (including every child in the country) went
missing in the post” (Dunn, 2017, part 16). Under the ‘Data Protection Act’
(passed by Parliament in 1998), any sensitive or personal data (collected by the
government, organisations or businesses) of any living person has to be handled
under strict guidelines, used only specifically and must be protected and kept
secure. However, software vulnerabilities, criminal insiders, poor security,
general recklessness and so on can breech this law. One may choose to utilize
the hidden web instead of the surface web in fear of having their data leaked,
perhaps even because they have already experienced this. Many choose to online
shop on the deep web in order to remain anonymous, through the use of its own
untraceable currency ‘Bitcoin’. For many it offers a safe and secure way in
which one can buy anything, particularly drugs. The most popular site in which
to buy this is ‘Silk Road’. Those who purchase drugs can find themselves in
dangerous scenarios when it is carried out in person and so darknet
marketplaces offer a safe, peer-reviewed, confidential, and judgement-free
space in which one can read a full description of what they are purchasing and
read reviews on the seller. Ross Ulbricht, (the libertarian creator of Silk
Road) defended it by arguing he is “‘creating an economic simulation to give
people a first-hand experience of what it would be like to live in a world without
the systemic use of force’” (Mac quoting Ulbricht, 2013, paragraph 17). One can
find legal services on the deep web also, which many may favour over indexed surface
web marketplaces in order to avoid advertising and pop-ups concerning what they
purchased. Some examples of purchases one may wish to keep private could be an
engagement ring, erotica or various items that would give away ones sexual
orientation, if they have an STD, relationship status, fetish, political ideology,
religion and so on. These personal details are often paraded around one’s
screen through adverts or cookies once they have been searched for on the
visible web. An example of advertising being too invasive is that of the U.S
shop ‘Target’. They “identified 25 products that when purchased together
indicate a women is likely pregnant. The value of this information was that
Target could send coupons to the pregnant woman at an expensive and
habit-forming period of her life.” (Lubin, 2012, paragraph 2). This occurred
when an underage pregnant teenager was sent baby product vouchers to her family
home after she had been privately researching it online, but had not yet
informed her parents.
The invisible web is a helpful resource to those who
value their privacy and want to protect it with the utmost assurance. It is
arguably one of the most important rights we have within a democracy,
especially under current surveillance methods. Daniel Solove, founder of
‘TeachPrivacy’ (a data security training company) explained why privacy
matters. Privacy limits the private sector and the state from exerting too much
power onto the public. The more they gain knowledge over the public, the easier
it is for them to use this as a tool to control us, which can have harmful
effects when carried out by unethical individuals (according to Foucault).
“Personal data is used to make very important decisions in our lives. Personal
data can be used to affect our reputations; and it can be used to influence our
decisions and shape our behaviour” (Solove, 2013, part 1), thus it is vital to
protect such sensitive details of our lives. An aspect of showing respect is to
allow for some privacy. State ‘spying’ without compelling reasons to do so can
feel trivial to some, however others view unnecessary amounts of surveillance
as disrespectful towards their desire to be private. There are times when
privacy conflicts with ethics and morals such as if one were trying to purchase
an illegal firearm in which to murder someone. This is a convincing enough
reason as to why a person would be a subject of suspicion, and so should be
under surveillance. Unethical individuals who hack into celebrities’ phones in
order to find profitable information on them or malicious people who seek to
leak private sexual content of a person are just some modern examples in which
people do not have privacy today. Anonymous networks such as the deep web seem
to be becoming more popular the less privacy we experience due to invasive
technological advancements within surveillance and the fear that it brings.
Privacy allows the public to manage their individual reputations. Our
relationships, opportunities and general welfare are affected by other’s
conclusions about us. Slanderous false statements or even certain divisive
truths can damage one’s reputation if exposed or expressed in any way. We all
have the right to protect our reputations from being unjustly harmed. “Knowing
private details about people’s lives doesn’t necessarily lead to more accurate
judgment about people. People judge badly, they judge in haste…out of context…without
hearing the whole story…with hypocrisy. Privacy helps people protect themselves
from these troublesome judgements.” (Solove, 2013, part 3). Similarly, social
boundaries (established by one’s society) that are broken from lack of privacy
can affect our relationships and create friction. Solove explained that “These
boundaries are both physical and informational. We need places of solitude to
retreat to, places where we are free of the gaze of others in order to relax
and feel at ease. We also establish informational boundaries, and we have an
elaborate set of these boundaries for the many different relationships we have.”
(Solove, 2013, part 4). One can manage these boundaries better by maintaining
their individual privacy, “Most people don’t want everybody to know everything
about them-hence the phrase ‘none of your business’. And sometimes we don’t
want to know everything about other people-hence the phrase ‘too much information.’”
(Solove, 2013, part 4). Maintaining confidentiality is to preserve trust. Trust
is essential to any dependable relationship one may have, whether it is
professional or personal. “In professional relationships such as our
relationships with doctors and lawyers, this trust is key to maintaining candor
in the relationship. Likewise, we trust other people we interact with as well
as the companies we do business with.” (Solove, 2013, part 5). This is why many
may feel reluctant to hand over any personal information if they have ever
experienced a professional or even governmental breach of trust. Moreover, “Personal
data is essential to so many decisions made about us, from whether we get a
loan, a license or a job to our personal and professional reputations…(It) is
used to determine whether we are investigated by the government, or searched at
the airport, or denied the ability to fly. Indeed, personal data affects nearly
everything, including what messages and content we see on the Internet.” (Solove,
2013, part 6). The ability to amend our own data is not always available to us
as well as the fact that we do not always know what our data is being used for
or how and why it is being used. In order for us to have freedom and autonomy
over our own lives we must be allowed the chance to be more involved in the way
our data is used for or against us, “if so many important decisions about us
are being made in secret without our awareness or participation” (Solove, 2013,
part 6) then we do not have control over our lives in what should be a successful
democratic system. Privacy and freedom of thought must coincide in a democracy.
“A watchful eye over everything we read or watch can chill us from exploring
ideas outside the mainstream. Privacy is also key to protecting speaking
unpopular messages.” (Solove, 2013, part 7). It is not only fringe activities
that are protected through the privacy of the deep web but also anonymous
casual conversations on online forums that contain sensitive information about
an individual’s opinions, relationships and so on. Privacy allows us to engage
in contentious topics such as politics, but panoptic surveillance can interrupt
or influence these discussions, “A key component of freedom of political
association is the ability to do so with privacy if one chooses. We protect
privacy at the ballot because of the concern that failing to do so would chill
people’s voting their true conscience.” (Solove, 2013, part 8).
What is legal now may not be in the future; up
until 2015, it was legal to smoke in a car with passengers under 18 present. Laws
are subject to change, yet ‘datamining’ (examining old databases to generate
new information) could in theory be used to blackmail people for their past
mistakes that are frowned upon but not criminal. This is why many prefer to use
the deep web to converse about divisive topics or speak freely and openly about
their lives in an anonymous and less threatening way. The notion of privacy
being an essential component of freedom of expression, thought and speech which
make up a free democracy is closely associated with civil libertarian ideology
because they often emphasize individual rights and freedoms over the
collective. Surface web websites can also prove resourceful. Media platforms and
organizations such as WikiLeaks were created in order to combat the
manipulation of the media surrounding the secret dealings of the government and
certain corporations. WikiLeaks embodies liberal thought by encompassing
digital freedom, exposing the truth behind corruption and is a useful tool for
researchers, journalists and the general public. They have exposed many private
intelligence documents from the NSA and CIA (Central Intelligence Agency) over
mass surveillance, focussing primarily on American intelligence. However, even
WikiLeaks can be exploited and manipulated as some argue their “moral high
ground depends on its ability to act as an honest conduit. Right now it’s
acting like a damaged filter.” (Ellis, 2016, paragraph 11) because of their
brash and sometimes insensitive leaking of private information, which can have
many dangerous consequences and an adverse effect on a free and open internet. Some
blamed the site for damaging the prospect of a Democrat win in the Clinton V.
Trump 2016 U.S election by leaking Clinton’s emails, “WikiLeaks is like the
internet. It can be a force for good or a force for bad. Right now it is
propping up a candidate running the most hateful campaign in modern times.”
(Smith quoting Sroka, 2016, paragraph 9). However, they defended this by
arguing they do not have a political bias, but wish to provide any truth they
uncover to the public. What they expose may not always work in their favour but
their main goal is to ensure the public can make an informed opinion on
political issues, rather than encourage a certain viewpoint. Organizations such
as this are necessary media platforms for truth in a world where much of
mainstream media can be full of bias, lies, misinformation or fear-mongering
rhetoric. People have even formulated ways in which one can use the surface web
but in an anonymous way such as through ‘VPN’s’ (virtual private networks) or a
‘Proxy’. These can be used as an alternative to the deep web by allowing one to
create and secure a connection to another network. One may use this in order to
access a business’s network while travelling across the country, hide their
browsing activity from online surveillance, bypass internet censorship, access
geo-blocked websites, and illegally download files, and so on.
To many, privacy is a human right and should not be
eroded by intrusive surveillance methods. Some even go as far as defiantly
arguing that we should not have to justify every action we do, however when
someone is doing something that could be seen as against the law then the
authorities have every right to question them in order to protect public
security. Others claim that we should have the ability to have second chances
after we have made a mistake. The ability to change, grow or re-invent oneself
is nurtured by privacy. It is an agreeable concept to seek a society that
wishes to allow for personal improvement and not hold on to past harmless
mistakes, yet this argument could be seen as a ‘slippery slope’. Is it
someone’s right to cover up their affair because of their right to personal privacy?
Not all misdeeds are mistakenly committed and some transgressions are too
serious to ‘write off’. The truly immoral or unethical acts people commit will
always tarnish their reputations as people should always be held accountable to
themselves and society. A clearer distinction (alongside appropriate and
suitable punishments) must be made between disobedient yet innocent enough acts
to depraved criminal offences. An example of how this is not always reflected
within U.K law was when “Mother-of-two Ursula Nevin…was jailed for five months
for receiving a pair of shorts given to her after they had been looted…” (BBC,
2011, paragraph 3) during the London Riots. Mass amounts of people (who were found
to be involved in the riot through surveillance) were sentenced to prison
instead of given fines or community service for what some argue were not always
‘serious crimes’. Surveillance is necessary in order to protect the public from
serious criminal activity, but can be taken too far with mass surveillance
through aggressive and intrusive means. Overall, the deep web can be seen as a
liberating bastion of freedom and resourceful tool in the effort to gain back
personal privacy and freedom which many believe has been challenged and eroded
by state surveillance. Despite this, there are some who believe the deep web is
a menacing and lawless underworld which threatens our security making state
surveillance a necessary defensive measure.
For
Surveillance: The ‘Dark’ Web
Contrastingly,
some maintain that a free and open web (void of any surveillance) is not only
undemocratic, but anarchical. There are many ethical concerns regarding the illicit
content found on the ungovernable dark web. The ‘dark side’ of this resource is
sometimes referred to as ‘Mariana’s web’ (named after the Mariana Trench)
because it reflects some of the deepest and darkest parts of the human psyche,
hence why many call the whole network the ‘dark web’. Here, “It is very easy to
run into arms dealers, drug cartels, spies, paedophiles, kidnappers, slave
traders and terrorists. You can buy top grade marijuana direct from the grower,
trade stolen credit cards, buy the names and addresses of rape victims, or
arrange the murder of an inquisitive reporter or pernickety judge” (Pearce,
2013, p6). Due to the hidden web being encrypted, it cannot be placed under
surveillance and so it is extremely difficult for security agencies to
infiltrate this vast network. Even if they were to find a specific website or
go undercover as a customer of some illegal service; a website may get taken
down, but only temporarily. Once a website is removed, it can be easily
replaced with a new identical one, perhaps under a different name, “A new and improved
version of Silk Road, called Silk Road 2.0, sprung up and was shut down again
by law enforcement agencies in November 2013” (Sui et al, 2015, p9). It is rare
to find criminals and arrest them as all transactions are made through the
untraceable bitcoin currency and done so anonymously by ‘PGP encryption’
(Pretty Good Privacy), which requires authentication for data and cryptographic
privacy. The uncontrollable nature of this ‘free and open space’ makes it
incredibly dangerous to security. Hackers have been known to leak private data
on to the dark web. The adultery website ‘Ashley Madison’ was targeted by
hackers where “92 Ministry of Defence email addresses” were released as well as
“1,716 email addresses from universities and further education colleges…56
National Health Service emails and less than 50 police emails” (Boyle, 2015,
part 1). Up to 32 million user’s personal details were released which
accumulated to “9.7 gigabytes of data -including card account details and log-ins
-on the Dark Web…Among the email addresses are many work accounts, including
thousands of those used by government workers - more than 100 of them said to
belong to UK Government workers.” (Boyle, 2015, part 3). Once information is
posted on to the dark web, it cannot ever be fully retracted. This demonstrates
how personal privacy can not only be gained from this ‘libertarian tool’, but
how it can also to be lost or challenged. Worryingly, the dark web “not only (contains)
illegal transactions in traditional goods and services and the latest hacking
tools, but are also a battlefield where cyberwar and cyberespionage are and
increasingly will be waged” (Sui et al referencing Goodman, 2015, p11). This
means “a cyberattack can be attributed to a state actor (particularly where the
attacker masks their identity, location, and origins of the code they use in
the attack, and the state from which the code was launched denies involvement)…”
(Sui et al, 2015, p11) thus creating a huge international security issue within
this electronic age. Serious and harmful criminal activity on the web needs to
be better monitored by the government and so new methods of surveillance must
be formulated in order to combat this problem. For legislators, “the continuing
growth of the Deep Web in general and the accelerated expansion of the Darknet
in particular pose new policy challenges. The response to these challenges may
have profound implications for civil liberties, national security, and the
global economy at large.” (Sui et al, 2015, p4). Thus, policymakers must
develop a comprehensive account for law enforcement, national and regulatory
security responses. However, “This focus needs also to take into account the
potential positive uses of the Deep Web. For instance, in 2010 TOR received an
award for Projects of Social Benefit from the Free Software Foundation for
services it provides to whistleblowers and human rights supporters.” (Sui et
al, 2015, p10). A reasonable balance of surveillance within daily life as well
as new hacking strategies specifically created to infiltrate the deep web must
be ensured in order to counter serious criminal activity. In conjunction with
this, it is agreeable to believe that the “understandable and legitimate privacy
interest in the Deep Web’s anonymity (or at least greater user control over
anonymity) does not mean that states should turn a blind eye to the entire Deep
Web.” (Sui et al, 2015, p10).
Nevertheless,
these security reasons are often how the state justifies mass surveillance, yet
the dark web was arguably created in response to strict surveillance by rebelling
against current panoptic oppression. Eric Schmidt (CEO of Google), dangerously
dismissed users’ right to privacy by stating “If you have something that you
don't want anyone to know, maybe you shouldn't be doing it in the first place.”
(Esguerra quoting Schmidt, 2009, paragraph 1). This brazen statement was
understandably met with disapproval as many contend that “if we are observed in
all matters, we are constantly under threat of correction, judgment, criticism,
even plagiarism of our own uniqueness. We become children, fettered under
watchful eyes, constantly fearful that-either now or in the uncertain future-patterns
we leave behind will be brought back to implicate us, by whatever authority has
now become focused upon our once-private and innocent acts. We lose our
individuality, because everything we do is observable and recordable.”
(Esguerra quoting Schneier, 2009, paragraph 3). Schmidt's declaration is “painfully
similar to the tired adage of pro-surveillance advocates that incorrectly
presume that privacy's only function is to obscure lawbreaking: ‘If you've done
nothing wrong, you've got nothing to worry about.’” (Esguerra referencing
Techdirt, 2009, paragraph 4). This was infamously said by William Hague (UK
politician) when advocating mass surveillance, arguing that it is only ever carried
out in the interests of the public. However, this argument has been countlessly
debunked. Solove argued that people always have parts of their life that they
wish to keep concealed, and that if relentlessly pursued, one can find minor
crimes in most people’s pasts. The view that security interests override the
public’s personal right to privacy is a precarious one for the protection of
civil liberties. Information collection is not necessarily always the issue
with surveillance as sensitive data is not often shared or even required. The
problem lies with “information processing-the storage, use, or analysis of
data…They affect the power relationships between people and the institutions of
the modern state. They not only frustrate the individual by creating a sense of
helplessness and powerlessness, but also affect social structure by altering
the kind of relationships people have with the institutions that make important
decisions about their lives.” (Solove, 2011, paragraph 16). If one accepts that
‘if we have nothing to hide, we have nothing to fear’ then one accepts the
faulty assumption that everything one may wish to hide is a negative thing, but
“Surveillance…can inhibit such lawful activities as free speech, free association…”
(Solove quoting Schneier, 2011, paragraph 18) which are vital for democracy. The
state’s secret aggregation of an individual’s personal information removes
their choice over whether they wanted to share those details or not, whilst
excluding them from the knowledge of how their data is being used. The power
structure between government and the general public is an imbalanced
relationship. Nonetheless, many argue that surveillance techniques are not only
used for security reasons but for the public’s ease. In order to use certain
mobile applications, social media or conveniently shop online, one gives up
some of their privacy. Yet, data can and is still being exploited and so “Without
limits on or accountability for how that information is used, it is hard for
people to assess the dangers of the data…” (Solove, 2011, paragraph 22) which
is being controlled by big businesses or the state. An example of a company
exploiting their power over customer’s privacy was when “Sex toy maker We-Vibe…agreed
to pay customers up to C$10,000 (£6,120) each after shipping a ‘smart vibrator’
which tracked owners’ use without their knowledge.” (Hern, 2017, paragraph 1). Customer’s
intimate sexual habits were being secretly recorded and stored by the company
in an effort to customise their products to suit their clientele. As well as
this, there were technological issues found within the device that would
potentially allow hackers to take control of the product’s functioning. The
commercial justification for surveillance is superficial and not strong enough
to validate extreme invasions of privacy or exploitation of the public’s trust.
The
Foucauldian concept of behaviour being negatively impacted by state monitoring is
often disputed by surveillance advocates as it is difficult to prove that every
person within society feels behaviourally inhibited or oppressed. However, it
can be argued that this is not enough to advocate mass surveillance or invasive
surveillance practices. Some believe that the problem with surveillance “is not
inhibited behaviour but rather a suffocating powerlessness and vulnerability
created by the court system's use of personal data and its denial to the
protagonist of any knowledge of or participation in the process. The harms are
bureaucratic ones-indifference, error, abuse, frustration, and lack of transparency
and accountability.” (Solove, 2011, paragraph 19). Nevertheless, there are some
that disagree with Foucault’s analysis of modern power for various reasons. “The
modern positive power Foucault offers us…is not really positive at all, being
all too ready to turn negative at the drop of a hat, being infected with the
urge to social critique, the urge that leads to so much of the aforementioned
hat dropping, and being far too close to some troubling, totalitarian
primacy-of-the-political thinking.” (Wickham, 2008, p41). Gary Wickham states
he has been “suspicious of this notion of ‘repression’” (Wickham, 2008, p29)
and believes Foucault’s account of power “is politically problematic, in two
ways: one, that it is rooted in a tradition of unengaged ‘critique’ and, two,
that it is tied, albeit inadvertently, to totalitarianism.”(Wickham, 2008,
p29). For Wickham, Foucault was only occasionally aware of the possibility of
accurately and methodically historicising his account, but did not adequately
connect these potential factors when stating that “modern government began in
an era before the governmentality era of the 18th and 19th centuries” (Wickham,
2008, p33). As well as this, Foucault’s theoretical focus on power as an
explanatory force unintentionally “became an ally of totalitarianism…without
enough consideration being given to the complexity of the social, left his
account vulnerable to the excesses of power obsessed totalitarian political
ideologies” (Wickham, 2008, p32). For some, these points determine that
Foucault’s analysis is not convincing enough to use as a political theory in
which to frame an argument. However, it can be argued that Foucault’s
unavoidable hostility towards totalitarianism did not make his approach in line
with totalitarian political thought but rather firmly and repeatedly against
it. Many maintain that “He seemed to imagine a neoliberalism that wouldn’t project
its anthropological models on the individual, that would offer individuals
greater autonomy vis-à-vis the state” (Drezner quoting Zamora, 2014, paragraph
2), against the potential rise of totalitarian thinking within government that
could pass undemocratic legislation over surveillance.
Even
so, some disagree that surveillance is ever a negative thing, but rather a
neutral and necessary feature of national security. Anthony Giddens opposed
that surveillance is panoptic but rather it should be “seen as documentary
activities of the state, as information gathering and processing, as
collection, collation and coding of information, and as records, reports and
routine data collection for administrative and bureaucratic purposes of
organizations.” (Allmer, 2011, p569). Christopher Dandeker similarly described
surveillance as neutral, “The term surveillance is not used in the narrow sense
of ‘spying’ on people but, more broadly, to refer to the gathering of
information about and the supervision of subject populations in organizations.”
(Dandeker, 1990, part vii). In this sense, panopticism is not a significant
notion in the analysis of modern surveillance. Surveillance is technical,
plural and should have a more broad definition which acknowledges both its enabling
and constraining effects. Roy Boyne also argued against the panoptic paradigm
by stating that this can be shown by the “redundancy of the Panoptical impulse
brought about by the evident durability of the self-surveillance functions
which partly constitute the normal, socialized, ‘Western’ subject; reduction in
the number of occasions of any conceivable need for Panoptical surveillance on
account of simulation, prediction and action before the fact; supplementation
of the Panopticon by the Synopticon; failure of Panoptical control to produce
reliably docile subjects.” (Allmer quoting Boyne, 2011, p571-572). The concept
of Synopticism theorises that surveillance has become an ‘even playing field’,
in the sense that new technologies have created an opportunity for anyone from
both the public and the state to observe any individual they wish to watch.
“Surveillance has become rhizomatic,
it has transformed hierarchies of observation, and allows for the scrutiny of
the powerful by both institutions and the general population.” (Haggerty and
Ericson, 2000, p617). Thus, many believe that surveillance is just a part of a
civilized, well-ordered society and the need for panopticism has decreased due
to its supposed inefficacy.
Yet,
Mark Poster emphasises that in the New Media Age the “technological
change has caused new forms of surveillance and an electronic Superpanopticon
in the postmodern and postindustrial mode of information. A Superpanopticon is
a process of normalizing and controlling masses and a form of computational
power” (Allmer quoting Poster, 2011, p574). The power of surveillance is not
equally devolved to the public. The public has little influential or
significant control over the state through this medium, except for the cases of
organizations such as WikiLeaks and so on which are often overlooked as
‘conspiratorial’ or criticised by the government for being problematic in their
efforts to take back some power from the state. Shoshana Zuboff argued that
panoptic power is especially evident within corporate institutions through
information technology as “new technologies at the workplace have brought a
universal transparency, increased hierarchy and control, and they provide the
management with a full bird’s-eye view to counter the behaviour of their
workers”. (Allmer quoting Zuboff, 2011, p574). Surveillance may be viewed as a
necessary technical process, but it is also unbalanced and if exploited, it can
be extremely oppressive to those targeted by it. The public is generally
unaware of every single surveillance method and are often not given the means to
use them in the same ways as the government does. Thus, we cannot exhibit as
much control through surveillance onto the state. Alongside this, the public
are also excluded from the decision-making process surrounding new surveillance
laws which directly impact every individual’s life. This is why many assert
that surveillance is a “complex high-tech system of power, where people are
sorted into categories in order to identify, classify, and assess them.
Furthermore, surveillance is used to normalize and homogenize behaviour with
discriminatory elements in a structure of hierarchical observation.” (Allmer
referencing Gandy, 2011, p574). Not all surveillance methods may be
specifically considered panoptic, for example Biometrics, yet many (if not
most) have panoptic features (such as CCTV and Bugging), in the sense that its
job is often to be a preventative measure in order to curb criminal activity by
making people feel more conscious of their actions as they feel they are being
watched with the possibility of being reprimanded.
The
dangers of having no surveillance has been evidenced through the dark web
medium, therefore this perilous aspect of the deep web should be a topic of
interest within national security discussions. However, the deep web is
arguably the only online public space in which one can experience pure
anonymity and privacy that cannot be replicated on the surface web. Its rich
content and numerous uses are necessary for individuals worldwide to have
access to, especially when surveillance methods are increasingly becoming more
intelligent, invasive and secretive. The deep web offers the public its own
preventative measure of being unjustly targeted by surreptitiously carried out
surveillance practices. The sheer power the deep web has by being accessible to
any person and the consequential covert knowledge contributed, makes this
resource extremely important in today’s technology driven world. The hidden web
is often used for innovative, legal, educational, humanitarian, civil rights,
or revolutionary reasons (as examples) and so it offers the general public
unvetted access to information that would in turn allow for more personal
privacy and freedom to be experienced by the user than if they were to use the
surface web. The need to balance the “protection of civil liberty for law-abiding
citizens with the concerns for national security remains a daunting challenge
for policymakers in the age of big data and Deep Web.” (Sui et al, 2015, p14).
In particular, the “economical actors such as corporations undertake
surveillance and exercise violence in order to control a certain behaviour of
people and in most cases people do not know that they are surveilled.
Corporations control the economic behaviour of people and coerce individuals in
order to produce or buy specific commodities for guaranteeing the production of
surplus value and for accumulating profit.” (Allmer, 2011, p588). This form of
surveillance is not used for security purposes and so should not be as
intrusive as it currently stands. Economic surveillance needs to be reviewed by
the state and public awareness should be encouraged, “public awareness of
surveillance issues could further be raised through professional groups and
organizations, especially those directly concerned with computing, information
management, and so on.” (Lyon, 1994, p223). The movement for critical privacy
must also be supported so to “develop counter-hegemonic power and advance
critical awareness of surveillance” (Allmer, 2011, p588). Overall, there is a
need for “transparency, oversight, and accountability as the mechanism to allow
surveillance when it is necessary, while preserving our security against
excessive surveillance and surveillance abuse.” (Schneier, 2015, paragraph 1).
Perhaps the UK government should take inspiration from various Scandinavian
countries where ‘natural surveillance’ is often a preferred method of
surveillance. Low fences, private balconies, open gardens and courtyards and so
on are built in order to increase visibility and allow residents to be a
powerful source of crime prevention. Bo Grönlund (an architect) explained that
Scandinavia’s physical environment is different from Britain’s abrasive “fences,
cameras and alarms…We wanted to do it in another way very consciously. The
basis was that Denmark should continue to be an open society with a minimum of
physical barring and formal surveillance.”(Laville quoting Grönlund, 2014,
paragraph 10). He wanted the atmosphere to be “…a calming environment, it is
not provocative. If you do things that tell you that you are a bad person–like
have cameras or gates everywhere–you might become that bad person, at least a
little bit.” (Laville quoting Grönlund, 2014, paragraph 9). This is just one
instance in which Britain can protect public security without eroding too much
personal privacy and essentially avoid any potential Orwellian aspects of a
totalitarian style government.
Conclusion
After Edward Snowden’s exposé of secret
governmental mass surveillance strategies, the knowledge of being watched has
made the topic of surveillance become more threatening and divisive. With ever
increasing technological innovation, surveillance techniques and practices have
been able to become more invasive. This has become problematic for libertarian
values within Western democracy as the rights to personal privacy, individual
autonomy, free speech, freedom of expression and freedom of thought are being
constantly challenged and slowly eroded by modern surveillance. This is
especially the case with corporate surveillance that targets the public through
intrusive methods for profit. When this form of ‘superficial’ surveillance
becomes exploitative of individual privacy, it ceases to be a legitimate or ethical
way in which surveillance ought to be used over the public. Michel Foucault
persuasively analysed the power modern surveillance has over the control over
the public in order to generate obedient subjects. Contemporary hierarchal
observation can be perceived as panoptic through the ways it has become a
preventative force through its inherent watchful nature and its powerful
lasting impact on the public due to its consequential judgement and
repercussion dynamic. It has been gradually normalised, becoming embedded
within today’s urban landscape and hailed as an indispensable aspect of civil
society. The critical discussion over surveillance challenges can be
successfully informed by Foucauldian poststructuralist features of the panoptic
paradigm and its effects on human behaviour and societal structures.
There is a need for balance within personal privacy
versus national security and state control and intervention versus individual
freedom and autonomy. Some of us have too readily accepted the gradual
tightening of security measures in order to feel protected and secure, however
there is a real need for public pressure and scrutiny in order to challenge the
state’s control and keep authority accountable. Panoptic surveillance
inevitably changes the way we live and interact authentically as it is meant to
curb disobedient behaviour. As surveillance practices continue to become more
invasive, public paranoia will also increase. Even if one has not done anything
legally ‘wrong’, one still has the right to retain their privacy and should be
allowed to conceal aspects of their life that are not appropriate to be watched
by state actors or corporations. Without this right to privacy, it is
conceivable to imagine a subsequent culture of fear and mistrust because of the
threat of always being watched and judged. This accusatory and potentially
Orwellian state control is fundamentally undemocratic in nature because of its
reminiscence of totalitarian power structures. Mass surveillance has provided
the public widespread opportunities in which to be obedient, but it has also
sparked much resistance through mediums and organizations such as WikiLeaks,
Big Brother Watch, Dead Drops, Don’t Spy on Us, Electronic Frontier Foundation,
the Deep Web and so on. Policymakers and security specialists must form new
counter strategies in order to infiltrate and combat the most violent,
malicious and sinister crimes that are so easily and freely carried out over
the hidden web. This is an important national security issue that needs more
attention within Parliament. Nevertheless, these risks do not outweigh the deep
web’s positive libertarian power to give the public digital privacy that we see
so often being exploited by modern online surveillance methods. This vast
resource’s potential for good ought not be overlooked or rejected, especially
for those who seek to fight for their democratic or humanitarian civil rights
in areas of the world that are not given so much freedom or choice due to heavy
or harsh surveillance laws. It can be said that the harsher surveillance laws
become, the potential for rebellious or resistant behaviour from the public
rises. Surveillance may be necessary in some situations in order to effectively
protect innocent citizens, but with this power, the responsibility to also
protect the public’s personal data becomes paramount.
It is not futile to resist exploitative mass
surveillance. The public must scrutinize governmental institutions so to
provide them with adequate checks and balances. We need more transparency,
accountability, oversight and knowledge within surveillance practices in order
to keep them as representative and democratic as possible. Intelligence
services ought to encompass an independent, transparent, well-informed and
comprehensive oversight regiment, prior to any impositions so that any unlawful
measures can be readdressed. The public should also be offered the opportunity
to access their own personal data in order to retain their dignity, privacy and
possible innocence. In these ways, dishonest or unethical mass surveillance
practices (whether it be from the state or private companies) can be more
easily dealt with, thus we can regain some individual freedom and personal
privacy in a society where modern state surveillance has challenged these
democratic values.
xx
Bibliography
Allmer, T. (2011), Critical Surveillance Studies in the Information Society (Vol.9
No.2), published by triple C,
accessed by http://www.allmer.uti.at/wp-content/uploads/2011/11/266-1006-1-PB-1.pdf, pages 572, 569,
571, 574, 588.
Bauman, Z. et al. (2014), After Snowden: Rethinking the Impact of
Surveillance, in International
Political Sociology (Vol.8 Issue.2, pp121-144), published by the
International Studies Association, Large-Scale
Techniques of Surveillance and the Global Reach of the Internet: A Permanent
Gap-paragraphs 4, 2 and Living with
Surveillance: Resignation, Perplexity and Resistance-paragraph 5.
BBC (2009), Who’s Watching You? -The technology of surveillance, posted onto
BBC news (21st May), available at http://news.bbc.co.uk/1/hi/programmes/whos_watching_you/7978415.stm, parts 1, 2, 3, 8,
9, 4, 7, 6.
BBC (2011), Some England riot sentences 'too severe', posted onto BBC news (17th
August), available at http://www.bbc.co.uk/news/uk-14553330, Riot Sentences- paragraph 3.
Bercovici, J. (2016), The Worst Thing That Could Happen to
Facebook Is Already Happening- Technology, posted onto inc.com (8th
April), available at http://www.inc.com/jeff-bercovici/facebook-sharing-crisis.html, paragraph 2.
Bergman, M. K. (2001), White Paper: The Deep Web: Surfacing Hidden
Value (Vol.7 Issue. 1), published
by Michigan Publishing, paragraph 5, part
27 paragraph 1.
Big Brother Watch (2017), information
posted onto bigbrotherwatch.org, available at https://www.bigbrotherwatch.org.uk/, About- part 1, Digital Economy Bill- part 1.
Brown, W. (2006), Power After Foucault, in The
Oxford Handbook of Political Theory, (eds.) Dryzek, J. S., Honig, B. and
Phillips, A., published by Oxford University Press, part 2 Contemporary Currents-pages 71, 76, 68.
Bogard, W. (1996), The Simulation of Surveillance, in Theorizing Surveillance, (ed.) Lyon, D., published by Cambridge
University Press, page 98.
Boyle, D. (2015), Ashley Madison hack: Live updates as 'UK Government email addresses'
in data of 32 million dumped online, posted onto The Telegraph (19th
August), available at http://www.telegraph.co.uk/news/11811356/Ashley-Madison-hack-live.html#update-20150819-1628, part 1, part 3.
Dandeker, C. (1990), Surveillance, Power, and Modernity: Bureaucracy and Discipline from
1700 to the Present Day, published by New York: St. Martin’s Press, part
vii.
Doctorow, C. (2011), Why CCTV has failed to deter criminals- Technology, posted onto
The Guardian (17th August), available at https://www.theguardian.com/technology/2011/aug/17/why-cctv-does-not-deter-crime, paragraphs 11,
12.
Don’t Spy On Us (date unknown), information posted onto
dontspyonus.org, available at https://www.dontspyonus.org.uk, Surveillance in the UK -part 4, Home-part 2.
Drezner, D. W. (2014), Why Michel Foucault is the libertarian’s
best friend, posted onto The Washington Post (11th December),
available at https://www.washingtonpost.com/posteverything/wp/2014/12/11/why-michel-foucault-is-the-libertarians-best-friend/?utm_term=.486fe85517bf, paragraph 2.
Dunn, J. E. (2017), The UK’s 16 most infamous data breaches, posted onto techworld.com
(2nd March), available at http://www.techworld.com/security/uks-most-infamous-data-breaches-3604586/, parts 3, 16.
Edwards, J. (2013), In Britain, Police Arrest Twitter And Facebook Users If They Make
Anti-Muslim Statements, posted onto businessinsider.com (26th
May), available at http://www.businessinsider.com/in-britain-police-arrest-twitter-and-facebook-users-if-they-make-anti-muslim-statements-2013-5?IR=T, paragraph
1.
Ellis, E. G. (2016), WikiLeaks Has Officially Lost the Moral High Ground- Surveillance, posted
onto wired.com (27th July), available at https://www.wired.com/2016/07/wikileaks-officially-lost-moral-high-ground/, paragraph 11.
Epstein, Z. (2014), How to find the Invisible Internet, posted onto bgr.com (20th
January), available at http://bgr.com/2014/01/20/how-to-access-tor-silk-road-deep-web/, paragraph 1.
Esguerra, R. (2009), Google CEO Eric Schmidt Dismisses the Importance of Privacy,
posted onto Electronic Frontier Foundation (10th December),
available at https://www.eff.org/deeplinks/2009/12/google-ceo-eric-schmidt-dismisses-privacy, paragraphs 1, 3,
4.
Frediani, C. (date unknown), Deep Web, Going Beneath The Surface, information
from Freedom From Fear Magazine, available at http://f3magazine.unicri.it/?p=889, paragraph 19).
Foucault, M. (1978), The Will to Knowledge: The History of Sexuality (Vol.1), published
by London Penguin Books, chapter 2 pages 93, 98.
Foucault, M. (1995), Discipline and Punish-The Birth of the Prison, translated from
French by A. Sheridan, published by a division of Random House Inc. New York, part
1 pages 9, 56, part 3 page 201, part 4 page 304, part 2 pages 119-120.
Fussell, S. (2016), How Facebook Live became the tool for live streaming death by police-
Black Mirror, posted onto fusion.net (29th September),
available at http://fusion.net/story/352130/facebook-live-twitter-black-pain-and-protest/, paragraphs 8,
11.
Gordon, C. (2013), Survey: 1 in 6 writers have self-censored because of NSA surveillance-
Flagship Blog, posted onto aljazeera.com (21st November),
available at http://america.aljazeera.com/watch/shows/america-tonight/america-tonight-blog/2013/11/21/survey-1-in-6-writershaveselfcensoredbecauseofnsasurveillance.html, paragraphs 19,
2, 4.
Haggerty, K. & Ericson, R. (2000), The Surveillant Assemblage, published
by British Journal of Sociology (pp605-622), page 617.
Hansen, L. (2007), Security As Practice- Discourse Analysis and the Bosnian War, in The New International Relations series,
published by Routledge Taylor & Francis Group, chapter 1 page 8.
Hern, A. (2017), Vibrator maker ordered to pay out C$4m for tracking users' sexual
activity, posted onto The Guardian (14th March), available at https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits, paragraph 1.
Hutter, G. et al. (2014), Governing Through Resilience? Exploring
Flood Protection in Dresden, Germany (pp272–287), in Social Sciences,
published by MDPI Open Access, part 2 page 274.
Laville, S. (2014), Designing out crime in Scandinavia: ‘Cities cannot be completely safe
and completely exciting at the same time’, posted onto The Guardian (24th
June), available at https://www.theguardian.com/cities/2014/jun/24/designing-out-crime-scandinavia-copenhagen-cities-safe-exciting, paragraphs 10,
9.
Lubin, G. (2012), The Incredible Story Of How Target Exposed A Teen Girl's Pregnancy, posted
onto businessinsider.com (16th February), available at http://www.businessinsider.com/the-incredible-story-of-how-target-exposed-a-teen-girls-pregnancy-2012-2?IR=T, paragraph 2.
Lyon, D. (1994), The Electronic Eye: The Rise of Surveillance Society, published by
Minneapolis: University of Minnesota Press, page 223.
Mac, R. (2013), Who Is Ross Ulbricht? Piecing Together The Life Of The Alleged
Libertarian Mastermind Behind Silk Road, posted onto Forbes (2nd
October), available at https://www.forbes.com/sites/ryanmac/2013/10/02/who-is-ross-ulbricht-piecing-together-the-life-of-the-alleged-libertarian-mastermind-behind-silk-road/#ad5a70f586dd, paragraph 17.
Marshall, S. (2013), How journalists can enter the 'deep web' to stay secure, posted
onto journalism.co.uk (9th October), available at https://www.journalism.co.uk/news/-wpe13-how-journalists-can-stay-secure-by-entering-the-deep-web-/s2/a554394/, Alarm bells-part 4 paragraph 1, Security Warning-part 7 paragraph 1.
New Scientist (2016), New UK surveillance law may see mass data
shared with Trump’s US, posted onto newscientist.com (22nd November),
available at https://www.newscientist.com/article/2113659-new-uk-surveillance-law-may-see-mass-data-shared-with-trumps-us/.
Pearce, A. (2013), Deep Web for Journalists: Comms, Counter-surveillance, Search, (ed.)
Horner, S., published by DeepWebGuides.com, pdf available at https://www.ifex.org/international/2013/06/24/deep_web_for_journalists_ifj_2013.pdf, A Dangerous Digital World-page 4, What is the Deep Web and why is it useful
to Journalists?- page 6.
Schneier, B. (2015), The Need for Transparency in Surveillance- Schneier on Security,
posted onto schneier.com (27th October), available at https://www.schneier.com/blog/archives/2015/10/the_need_for_tr.html, paragraph 1.
Smith, D. (2016), From liberal beacon to a prop for Trump: what has happened to
WikiLeaks?, posted onto The Guardian (14th October), available
at https://www.theguardian.com/media/2016/oct/14/wiileaks-from-liberal-beacon-to-a-prop-for-trump-what-has-happened, paragraph
9.
Solove, D. (2011), Why Privacy Matters Even if You Have 'Nothing to Hide'- excerpt
taken from Nothing to Hide: The False
Tradeoff Between Privacy and Security, posted onto The Chronicle of Higher
Education (15th May), available at https://web.archive.org/web/20151116013709/http://chronicle.com/article/Why-Privacy-Matters-Even-if/127461/, paragraphs 16,
18, 19, 22.
Solove, D. (2014), 10 Reasons Why Privacy Matters, in Big Ideas & Innovation, posted onto linkedin.com (13th
January), available at https://www.linkedin.com/pulse/20140113044954-2259773-10-reasons-why-privacy-matters, parts 1, 3, 4,
5, 6, 7, 8, 9.
Sui, D. et al. (2015), The Deep Web and Darknet: A Look inside the
Internet’s Massive Black Box, in Science
and Technology Innovation Programme, published by Woodrow Wilson Centre, pages
4, 10, 11, 9, 14.
Wickham, G. (2008), The social must be limited- Some problems with Foucault's approach
to modern positive power, in Journal
of Sociology (Vol.44 issue.1 pp 29-44), published by The Australian
Sociological Association, pages 41, 29, 33, 32.
Subscribe to:
Posts (Atom)