WEEK 12 – REPLY 300 WORDS EACH

 

1) With Modern Surveillance technologies the government has the option to know its people by using the latest technology. The data relating to activities and interests of people is gathered from Information and Communication Technology, which has become the closest partner of people, including the use of the internet. It further explains how the government can keep a check on its people, while maintaining their privacy level, along with contextual integrity. The government makes satellite monitoring to get locational data. This information can be used in the Police department for the investigation of crimes. the application of data in this modern era, where behavioral data can become a source of revenue, and humans are considered part of this process and not the endpoint of revenue making process. It first explains the fact that Google which is considered a safe and secure website also holds user’s data and this data can be handed over to authorities if needed. The source explains how Google is violating the privacy of millions of people for the collection of big data, like they retain browsing histories, and takes photos of people’s houses without even asking permission.

Annotated Bibliography

Source #1

Giroux, H. A. (2015). Totalitarian paranoia in the post-Orwellian surveillance state. Cultural Studies, 29(2), 108-140.

The source “Totalitarian paranoia in the past-Orwellian surveillance state” (Giroux, 2015) objects to discover the public privacy threats arise by government spying. The source then explains the impacts of surveillance and says that people are deprived of their freedom of thinking and speech because of the institution of being tracked. It says that the latest information and communication technology devices like microphones, internet, videos, cameras, and text messages provide more facility to surveillance organizations than customers. Private and public space is easily violated and even a third party keeps records of a person’s shopping choices and personal messages from social media. Finally it says that we are leading a surveillance culture by a surveillance state. 

This source changed my research approach and provided me multiple valid points which I further used in my paper. For instance, the use of biometric bracelets that tells the attention of students sitting in the hall. It cleared my position by saying that this surveillance is against freedom and democracy which gave people the right to keep their things private. It helped me explain the fact the NSA is a threat to privacy and freedom. Companies can spy any customer or individual because they run their own data-mining setup. 

Source #2

Schaefer, A. T., & Claridge-Chang, A. (2012). The surveillance state of behavioral automation. Current opinion in neurobiology, 22(1), 170-176.

The source “The surveillance state of behavioral automation” aims to explain the latest use of behavioral data. It says that even complex behaviors can be analyzed and observed. The behaviors include comprehensive observation of animals and humans behavior. In a behavioral study, psychology is also attached, and the techniques include a blend of these domains. The tracking, sorting, and motion capture methods help in automation, which is the physiology of animal transformation. 

I found this source during my research, and it helped me in explaining my argument clearly about behavioral automation. The method and approach used in the source to describe the surveillance state changed my approach to research. I found this source when I was searching for the reasons for the huge significance of behavioral data. It helped me in understanding the current atomization in behavioral studies. It also identified the latest techniques that can improve observation and experimentation in various neuroscience aspects. 

Source #3

Sorell, T., & Draper, H. (2012). Telecare, surveillance, and the welfare state. The American Journal of Bioethics, 12(9), 36-44.

The source “Telecare, surveillance, and the welfare state” (Sorell & Draper, 2012) explains how surveillance and telecare are being provided to people and their role in the welfare of the country. It explains in detail these terminologies and the processes they use. The major argument supported in this source is that people do not like being tracked by a party. The concept of the surveillance state is becoming ubiquitous in America, and telecare is playing an important part in it. Telecare is promoting the freedom and independence of customers, by providing those services at their desired locations. 

I found this source during my research process, and it helped me in explaining my point clear to those who exclude telecare from the surveillance state. Surveillance states can support independence, where people are tech-savvy, and technology is solving their problems. The source also explains how surveillance can intervene in an emergency. This source directs me in the research approach and guided me in explaining my argument, in a highly cohesive and comprehensive way. I used this source to explain telecare benefits for independence and its contribution to making a surveillance state. 

Source #4

Taylor, J. A., Lips, M., & Organ, J. (2008). Identification practices in government: citizen surveillance and the quest for public service improvement. Identity in the Information Society,1(1), 135.

The source “Identification practices in government: citizen surveillance and the quest for public service improvement” (Taylor et al., 2008) aims to explain the concept of the surveillance state. It says that the government has the option to know its people by using the latest technology. The data relating to activities and interests of people is gathered from Information and Communication Technology, which has become the closest partner of people, including the use of the internet. It further explains how the government can keep a check on its people, while maintaining their privacy level, along with contextual integrity. The government makes satellite monitoring to get locational data. This information can be used in the Police department for the investigation of crimes. We can summarize that the information collected is used in the public sector ranging from license making to pensioner records. 

I found this source at the beginning of my research, and it strengthens my position by supporting my argument. At the start of my research I was completely biased about information capitalism and I was only seeing one side of the picture which argues companies are breaching the privacy of people, and they have no right to collect information without the permission of its users. This source clearly depicts the positive aspects and applications of information collected by users. With the help of this source, I was able to explain the point that this information is shared with the government, where it is distributed to other departments like police, etc. 

Source #5: 

Zuboff, S. (2015). Big other: surveillance capitalism and the prospects of an information civilization. Journal of Information Technology, 30(1), 75-89.

The source “Big other: surveillance capitalism and the prospects of an information civilization” (Zuboff, 2015) aims to inform readers about the application of data in this modern era, where behavioral data can become a source of revenue, and humans are considered part of this process and not the endpoint of revenue making process. It first explains the fact that Google which is considered a safe and secure website also holds user’s data and this data can be handed over to authorities if needed. The source explains how Google is violating the privacy of millions of people for the collection of big data, like they retain browsing histories, and takes photos of people’s houses without even asking permission. The high use of Google gave it the benefit of a high amount of data, which assists Google to design predictive products first hand. In the end it explains the agreements, communication, and personalization of Google, and says that many of the users are unaware of the fact that they have lost control of their personal data, which is further used for their digital benefits and services. 

I found this source during my research and it helped me in explaining my arguments. I was unsure about how enterprises use institutional logic, and this source cleared my position regarding behavioral data and personal data, which companies collect based on using their institutional logic which allows them to hack and violate the privacy of customers. This source helped me to understand how companies and businesses control behaviors of customers now, which was opposite in the past. This big data, although it is providing large facilities, on the other side it is intervening in customer’s own matters, which is not liked by many people. This source changed my research approach by providing the argument that surveillance capitalism should not be considered completely evolved, and many aspects of it needed to be carefully examined. 

2) 

In the present enhanced technological scenario, surveillance tasks are being done using state-of-art Information Technology techniques and tools and these are used to extend and augment traditional surveillance systems. In addition to this augmentation, latest Information and Communication Technologies (ICT) are being used in digital domain under the name ‘surveillance capitalism’.  Government is predominantly using surveillance techniques either by intelligence services or law enforcement and these are normally justified with an appeal to the “greater good” and protecting citizens but their use is always controversial. Majority of citizens are upset with these mass surveillance actions as their privacy is lost and feel their fundamental rights are denied. Government is sometimes harsh on citizens to implement security activities to protect nations. Now the basic the argument of the public is a trade-off between privacy and security of citizens and nation is not inevitable but is shaped by surveillance employed as a technology-supported security practice, reinforced by securitization under Federal and State security laws.

In view of the above the Agenda or Topic of the project is to study and discuss the ethical implications which surveillance, privacy and security call upon us to pay more attention to are those of our own choices, both individual and collective, and choices of government to protect ourselves, information data security and nation’s security without diluting the spirit of these three by adhering to prevailing Federal and State Laws.

Related Quotes & Bibliography:

“Government classifies far too much information, frequently in violation of applicable laws governing what information may and may not be classified.”

Barry Eisler, author, and former CIA officer spoke at the Association of Former Intelligence Officers opposite ex-CIA and NSA director Michael Hayden. Barry Eisler has served under active positions in the CIA’s Directorate of operations and now live in San Francisco Bay Area.

https://boingboing.net/2016/03/01/on-whistleblowers-and-secrecy.html 

 “Free speech has occupied an exalted position because of the high service it has given our society. Its protection is essential to the very existence of a democracy. . . . It has been the safeguard of every religious, political, philosophical, economic, and racial group amongst us. . . . [Free speech] has been the one single outstanding tenet that has made our institutions the symbol of freedom and equality.”

William O. Douglas, the longest-serving justice in the history of the Supreme Court as he served from (1939-75), and he also wrote books on this experience and observation from his travel diaries as well

https://www.mtsu.edu/first-amendment/article/1328/william-douglas

“Today we are at a crossroads. The technology is available for two great options: The massive surveillance state or the renewed freedom of a deeply-involved citizenry thinking independently and holding the government to the highest standards”

Oliver DeMille is an American author, educator, and public speaker. He is the founder of an educational model known as TJEd and the co-author of Leader Shift. His work mostly is related to education and Orrin Woodward is also considered as a co-author for this.

https://www.azquotes.com/quotes/topics/surveillance-state.html

“There currently are and always have been real and material consequences of state surveillance that place the physical well being of individuals at risk”

Jonathan Hofer is a senior studying political science at the University of California, Berkeley.

https://www.dailycal.org/2019/04/23/california-needs-to-better-regulate-surveillance/

“Do we want to live in a society where we live totally naked in front of the government, and they are totally opaque to us”

Edward Joseph Snowden is an American whistleblower

https://www.amnesty.ca/our-work/issues/survelliance-security-and-human-rights/mass-surveillance

“You have an always expanding, omnipresent surveillance state that’s constantly chipping away at the liberties and freedoms of law-abiding Americans.”

Ronald Lee Wyden is an American politician who is currently serving as the senior United States Senator for Oregon

https://www.azquotes.com/quote/1341720

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *