0
Wired for Repression                @   The Young India Fellowship      19th of January, 2012
Technologies• Mobile Tracking• Internet Traffic• Product Location
Mobile Tracking• More mobile users as compared to any other communication  technology.• Middle agents all over the world e...
Internet Tracking• Deep packet inspection, which peers into the content of  communications and sends suspect e-mails to th...
Product Tracking• Tracks people of particular interest to the nation state via  product positioning systems that could eas...
Ethical Technology Assessment       Criteria                         Mobile Tracking       Dissemination and              ...
Picture Credit: Tangled Network, used under CC-BY-SA by Bruno Girin
Picture Credit: Bejealousofme, Flickr, Creative Commons
•   Picture credit: Relationships start here- jenny bento/flickr - reproduced under a Creative Commons licence asa generic 2
• Laws, operator agreements, contractual obligations,                                        private arrangements.        ...
1. How equitable should the selection of research subjects be and if,and how, surveillance technology could be tested? Wou...
Upcoming SlideShare
Loading in...5
×

Ethics & technology_Wired for repression

210

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
210
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Tangled Network, used under CC-BY-SAby Bruno Girin
  • Picture credit: relationships start here - jenny bento/flickr - reproduced under a Creative Commons licence asa generic 2
  • E. Kenneally, M.Bailey, D. Maughan, A framework for understanding and applying ethical principles in network and security research, Workshop on Ethics in Computer Security Research (WECSR) January 2010.
  • Transcript of "Ethics & technology_Wired for repression"

    1. 1. Wired for Repression @ The Young India Fellowship 19th of January, 2012
    2. 2. Technologies• Mobile Tracking• Internet Traffic• Product Location
    3. 3. Mobile Tracking• More mobile users as compared to any other communication technology.• Middle agents all over the world enabling global trade of tracking system making it impossible to track.• Information stored in humungous storage locations, checked for seditious content via specific searches based on recipient/sender/particular keywords.
    4. 4. Internet Tracking• Deep packet inspection, which peers into the content of communications and sends suspect e-mails to the Interior Ministry and stores it for inspection later on.• Tunisia: Aided by US/European suppliers, Ammar 404 took control of virtually all electronic communication -- even changing the content of e-mails in transit. In this world, Tunisians could never be sure if e- mails arrived as sent or at all, or who was reading them.
    5. 5. Product Tracking• Tracks people of particular interest to the nation state via product positioning systems that could easily be incorporated into mobile/laptops.• Some systems provide up to 15 second accuracy.
    6. 6. Ethical Technology Assessment Criteria Mobile Tracking Dissemination and No way for the targeted population to control the way Use of Information these technologies disseminate highly sensitive info. Control, Influence Affordability of Surveillance Technologies and Storage and Power facilities Privacy Right to Privacy being infringed but becomes necessary due to the existing conditions (socio-political) and the use of the surveillance information becomes critical to the Right to Privacy. Surveillance is a trade-off in the social contract between the government and the citizen. Minorities and Social Sort, obstruction of justice Justice International Food and Medicines Relations Human Values Compromise on human values on both the higher and the base level of the communities.E. Palm and S. O. Hansson. The case for ethical technology assessment (eTA), Technological Forecasting & Social Change 73 (2006) 543–558
    7. 7. Picture Credit: Tangled Network, used under CC-BY-SA by Bruno Girin
    8. 8. Picture Credit: Bejealousofme, Flickr, Creative Commons
    9. 9. • Picture credit: Relationships start here- jenny bento/flickr - reproduced under a Creative Commons licence asa generic 2
    10. 10. • Laws, operator agreements, contractual obligations, private arrangements. • Country specific laws, bilateral relations • Full disclosure• Benefits/Burdens shared fairly between research target subjects & beneficiaries of research results.• Should the company should have the ultimate responsibility for the usage of its products – especially national level surveillance. • Beneficence to persons and organizations. • It’s difficult to customise technology with respect to all harms & for every country, but it’s time for surveillance to be under surveillance.Picture credit: probs-endoftheline/flickr - reproduced under E. Kenneally, M.Bailey, D. Maughan, A framework for understanding and applying ethical principles inCreative Commons network and security research, Workshop on Ethics in Computer Security Research (WECSR) January 2010.
    11. 11. 1. How equitable should the selection of research subjects be and if,and how, surveillance technology could be tested? Would sampletesting help? Or would that be even more comprehensiveinfringement of privacy?2. How would a system of personal notification play out in nationallevel surveillance as ICT do not often require human interaction andwhat could be some of the preventive measures?3. With surveillance technology, how far can research go in ensuringprivacy, civil rights and well-being of persons?4. What sort of role has surveillance to play in democracy and whatlegislative principles should it be guided by?
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×