copyright 1987-2009 1 asimov's laws of robotics. copyright 1987-2009 2 human-artefact...

43
Copyright 1987-2009 1 Asimov's Laws of Robotics QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. QuickTime™ and a TIFF (Uncompressed) decompressor are needed to see this picture. QuickTime™ and TIFF (Uncompressed) are needed to see t

Upload: chloe-porter

Post on 26-Mar-2015

215 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

1

Asimov's Laws of Robotics

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture. QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

Page 2: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

2

Human-Artefact

Hybridisation (Cyborgisation

)

Page 3: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

3

Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW

and in Computer Science, ANUChair, Australian Privacy Foundation

Access and Privacy WorkshopToronto – 26-27 October 2009

http://www.rogerclarke.com/DV/SSF-0910 {.html,.ppt}

Page 4: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

4

Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW

and in Computer Science, ANUChair, Australian Privacy Foundation

Access and Privacy WorkshopToronto – 26-27 October 2009

http://www.rogerclarke.com/DV/SSF-0910 {.html,.ppt}

Surveillance in Speculative Fiction

Page 5: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

5

Surveillance in Speculative FictionAGENDA

• Surveillance• Speculative Fiction Genres• Surveillance in Speculative

Fiction and in Reality

• Aural• Visual• Person Id, Location and Tracking• Counterveillance• Sousveillance

• Is Privacy Really Dead?

Page 6: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

6

SurveillanceThe systematic monitoring or investigation of the actions or communications of one or more persons,directly, or through the monitoring of space or objects

Personal SurveillanceFocus on an identified person:

• because of suspicion about that individual• for activity deterrence / behaviour repression

Mass SurveillanceFocus on groups or spaces:

• to generate suspects• for activity deterrence / behaviour repression

Page 7: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

7

PHYSICAL Surveillance• Localised

Listening, Observation

• At Distance (Enhanced Listening, Observation)

Sound-Amplification Devices (directional microphones)Image-Amplification Devices (field glasses, infrared binoculars, light amplifiers, satellite cameras)

• Auto (i.e. by means of the Self)Devices that are attached to the person:

• loosely but reliably ('mil dog-tags', mobile phone)• tightly (anklet)• implanted

Page 8: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

8

'ELECTRONIC' Surveillance'Speech Surveillance'• Mail ‘Covers’, Telephone Interception, eMail

Interception:• connections monitoring / traffic analysis

(who is talking with whom)• communications surveillance

(who is saying what to whom)

'Experience Surveillance' / 'Behaviour Surveillance'

• The Web enables surveillance of:• pages visited (to support selective advertising)• books bought• books and articles read at home or in the library

• Metered Road Usage; Identified Public Transport Tickets

Page 9: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

9

What were once Ephemera ObservedAre Now Events Recorded and AnalysedWhat was 'NOW OR NEVER' is now 'SOONER OR

LATER'

ENABLERS:• Sound-Recording• Speech-Traffic-

Recording• Image-Recording• Transaction-RecordingFACILITATORS:• Trail-Generation• Trail-Correlation

NEW CAPABILITIES:

• Retrospective Analysis

• Real-Time Location

• Real-Time Tracking

• Anticipatory Tracking

Page 10: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

10

DataveillanceThe systematic use of personal data systems

in the monitoring or investigationof the actions or communications

of one or more persons

Page 11: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

11

DataveillanceThe systematic use of personal data systems

in the monitoring or investigationof the actions or communications

of one or more persons

Term first published in Commun. ACM in 198822,200 / 14,000 hits on Google in 2007 / 2009

581 / 1,230 hits on Google Scholar in 2007 / 2009(at least 166 / 425 of which do not contain 'Clarke')

Page 12: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

12

Categorisation of Surveillance(1) Of What? Person, Object, Space

(2) For Whom? Person, Involved Party, Third Party

(3) By Whom? Person, Involved Party, Third Party

(4) Why? Wellbeing, Evidence, Deterrence

(5) How? Physical (visual, aural, at distance, auto-surveillance); Dataveillance(retrospective, real-time, predictive);Communications / Experience;Personal / Mass Surveillance

(6) Where? Physical, Virtual, Intellectual

(7) When? Once, Recurrent, Scattered, Continuous

Page 13: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

13

Genres

• Anti-Utopia / Dystopia• We (Zamyatin)

• Human-as-Cockroach• The Shockwave Rider

(Brunner)• Cyberpunk

• Neuromancer (Gibson)• Cyberprep

Page 14: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

14

Anti-Utopia / Dystopia – 1

Page 15: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

15

Anti-Utopia / Dystopia – 2

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

Page 16: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

16Human as Cockroach

Page 17: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

17

Cyberpunk

Page 18: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

18

Aural Surveillance

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

Page 19: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

19

Visual Surveillanc

e

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

Page 20: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

20

Identification, Location and Tracking

• Identification (who?)• Location (where?)• Tracking

(from where to where?)

• Retrospective• Real-Time• Prospective

• Artefacts as Proxies• Motor Vehicles• Mobile Phones

• Iris Scanning• Attachments• Implantation

Page 21: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

21

Identification, Location and TrackingVehicles as Proxies

The policemen on duty have instantaneous kodaks mounted on tripods, which show the position of any vehicle at quarter-second intervals, by which it is easy to ascertain the exact speed; so there is no danger of a vehicle's speed exceeding that allowed

Page 22: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

22

Identification, Location and TrackingVehicles as Proxies

The policemen on duty have instantaneous kodaks mounted on tripods, which show the position of any vehicle at quarter-second intervals, by which it is easy to ascertain the exact speed; so there is no danger of a vehicle's speed exceeding that allowed

John Jacob Astor IV

Page 23: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

23

Identification, Location and TrackingVehicles as Proxies

The policemen on duty have instantaneous kodaks mounted on tripods, which show the position of any vehicle at quarter-second intervals, by which it is easy to ascertain the exact speed; so there is no danger of a vehicle's speed exceeding that allowed

John Jacob Astor IVDied on the Titanic,

1912

Page 24: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

24

Identification, Location and TrackingVehicles as Proxies

Vehicle IdShe fumbled in the storage compartment on the instrument board, apparently purposelessly.But the registration number which the traffic control automatically photographed as she left the controlway was not the number in which the car was registered

Page 25: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

25

Identification, Location and TrackingVehicles as Proxies

Vehicle IdShe fumbled in the storage compartment on the instrument board, apparently purposelessly.But the registration number which the traffic control automatically photographed as she left the controlway was not the number in which the car was registeredRobert Heinlein, 1941

Page 26: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

26

Identification, Location and TrackingVehicles as Proxies

Vehicle IdShe fumbled in the storage compartment on the instrument board, apparently purposelessly.But the registration number which the traffic control automatically photographed as she left the controlway was not the number in which the car was registeredRobert Heinlein, 1941

ANPRInvented in 1976, Deployed in 1979

Page 27: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

27

Iris Scanning• 'Minority Report', Stephen Spielberg,

Dreamworks, Released 12 June 2002

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

Page 28: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

28

Iris Scanning• 'Minority Report', Stephen Spielberg,

Dreamworks, Released 12 June 2002

• Abu Dhabi Illegal Immigrant schemeDeployed October 2002http://www.accessmylibrary.com/coms2/summary_0286-22721314_ITM

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

Page 29: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

29

Attachments for Felons (and Remandees, and ...)

• Tattletales"...But if we do let you go, you must agree to carry tattletales with you at all times. Inquire of your attorney Mr. Sharp if that will be acceptable." "What the hell is a tattletale?" Joe Schilling asked. "A tracing device," Hawthorne said. "It will inform us where each of you are at all times" – Philip K. Dick, 1963

Page 30: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

30

Attachments for Felons (and Remandees, and ...)

• Tattletales"...But if we do let you go, you must agree to carry tattletales with you at all times. Inquire of your attorney Mr. Sharp if that will be acceptable." "What the hell is a tattletale?" Joe Schilling asked. "A tracing device," Hawthorne said. "It will inform us where each of you are at all times" – Philip K. Dick, 1963

• Ankle Monitors / Electronic Tagging of HumansFirst officially sanctioned use, in New Mexico, 1983

Page 31: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

31

Human Implantation• Radiant – a substance injected into the shoulder,

providing positioning, information – Jack Vance, 1954

• The Ring – 'A surgically implanted electronic monitor that caused agony when a convict strayed ... ' – Piers Anthony and Robert Margroff, 1968Skull Bug – Electronic device implanted in the cranium at birth, for monitoring and control – Alfred Bester, 1974

Page 32: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

32

Human Implantation• Radiant – a substance injected into the shoulder,

providing positioning, information – Jack Vance, 1954

• The Ring – 'A surgically implanted electronic monitor that caused agony when a convict strayed ... ' – Piers Anthony and Robert Margroff, 1968Skull Bug – Electronic device implanted in the cranium at birth, for monitoring and control – Alfred Bester, 1974

• Resistance from a journal editor about the idea – 1992

Page 33: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

33

Human Implantation• Radiant – a substance injected into the shoulder,

providing positioning, information – Jack Vance, 1954

• The Ring – 'A surgically implanted electronic monitor that caused agony when a convict strayed ... ' – Piers Anthony and Robert Margroff, 1968Skull Bug – Electronic device implanted in the cranium at birth, for monitoring and control – Alfred Bester, 1974

• Resistance from a journal editor about the idea – 1992

• First chip implantation in animals – 1991

Page 34: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

34

Human Implantation

• First voluntary chip implantation in humans – 1998

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

Page 35: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

35

Human Implantation• Radiant – a substance injected into the shoulder,

providing positioning, information – Jack Vance, 1954• The Ring – 'A surgically implanted electronic monitor

that caused agony when a convict strayed ... ' – Piers Anthony and Robert Margroff, 1968Skull Bug – Electronic device implanted in the cranium at birth, for monitoring and control – Alfred Bester, 1974

• Resistance from a journal editor about the idea – 1992• First chip implantation in animals – 1991• First voluntary chip implantation in humans – 1998• First imposed chip implantation in humans – 2000?

2004?

Page 36: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

36

Countersurveillance• Spoofing of Traffic-Monitoring Camera – " ... the

registration number which the traffic control automatically photographed as she left the controlway was not the number in which the car was registered" – Robert Heinlein, 1941

• Spy-Proof Office – montors received a conversation constructed at random out of a vast stock of innocuous phrases in various tone and voices. And undetectably so' – Isaac Asimov, 1951

• Radiant Shield – A pad of woven metal around the shoulder and chest – Jack Vance, 1954

• Probe Screen Hood – A device that blocks attempts to see into the contents of the brain mind – Philip K. Dick, 1955

• Eavesdropper – an object that will detect if a is microphone is close enough to pick up conversation – James Blish, 1957

Page 37: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

37

Sousveillance• The Unsleeping Eye – substituted for a human eye

D.G. Compton, 1973, filmed as La mort en direct, 1980• Wearcam – Steve Mann, c. 1980• True-Vu Lenses – 'Oldsters used electronic sun hats

and True-Vu goggles to surveil young people and any other trouble makers. The goggles would record whatever the wearer was watching, and then upload it to a secure location (in case anything happened)' – David Brin, 1990

• Sousveillance – Steven Mann, coined c. 1995 for the use of optic technologies to observe those in authority

• Alibi Archive – A recording of transmissions from a personal implant, storing everything that happened to that individual – Robert J. Sawyer, 2003

Page 38: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

38

TheBlurring

of

Speculative

Fiction

and

Reality

Page 39: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

39

Interpretations

• You have zero privacy anyway, get over it

• Privacy is for people with something to hide

• Privacy through secrecy is dead

• Newgens have a completely different approach

• Privacy is bruised but unbowed

• Privacy is essential for humanity to survive

Page 40: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

40

Surveillance in Speculative FictionAGENDA

• Surveillance• Speculative Fiction Genres• Surveillance in Speculative

Fiction and in Reality

• Aural• Visual• Person Id, Location and Tracking• Counterveillance• Sousveillance

• Is Privacy Really Dead?

Page 41: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

41

Conclusions

• Surveillance offers fiction-writers a lot of scope

• Authors' imaginations have mostly run onlya few, short decades ahead of technology

Page 42: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

42

Conclusions

• Surveillance offers fiction-writers a lot of scope

• Authors' imaginations have mostly run only a few, short decades ahead of technology

• Surveillance is increasing privacy concerns• Active opposition is imminent, as

surveillance goes beyond the levels of acceptability

Page 43: Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Copyright1987-2009

43

Conclusions• Surveillance offers fiction-writers a lot of scope• Authors' imaginations have mostly run only

a few, short decades ahead of technology• Surveillance is increasing privacy concerns• Active opposition is imminent, as surveillance

goes beyond the levels of acceptability• 'We must teach our technologies to forget'• Maybe we must also teach our technologies

to forego data collection, except with consent or where reasonable grounds for suspicion exist